Categories
culture

Stealthy Hackers

Cybersecurity is an iterative, recombinatory and open-ended logical process.

Context:

Hackers getting stealthier, report finds

Increasing investment in stealth is an inevitability of the selection mechanisms at work in this (particular) integrated information-systems context. The flip-side is that interdiction inversely cultivates and refines the successful channels, methods and apertures of vulnerability; antibiotic resistance follows a similar process of distillation. Techniques and methods that remain (however temporarily) unidentified or otherwise successfully run the gauntlet of detection generate the heuristics and methods of the next generation of technical methods. It is an iterative, recombinatory and open-ended logical process.

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.