Categories
culture

Stealthy Hackers

Cybersecurity is an iterative, recombinatory and open-ended logical process.

Context:

Hackers getting stealthier, report finds

Increasing investment in stealth is an inevitability of the selection mechanisms at work in this (particular) integrated information-systems context. The flip-side is that interdiction inversely cultivates and refines the successful channels, methods and apertures of vulnerability; antibiotic resistance follows a similar process of distillation. Techniques and methods that remain (however temporarily) unidentified or otherwise successfully run the gauntlet of detection generate the heuristics and methods of the next generation of technical methods. It is an iterative, recombinatory and open-ended logical process.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.