Categories
Complexity

Power Laws in Cybersecurity

Great graphic (from the people at Information is Beautiful) but it immediately raises a question of just how we measure severity, extent and consequence in this context. Is there an offset and identifiable boundary between naive analysis that concentrates on common as relatively unproblematic or pragmatic metrics and more detailed (yet broader spectrum) analysis that […]

Categories
Philosophy

Technological Vulnerability

As every new systemic weakness and information system vulnerability emerges, I can never quite escape a wistful philosophical reflection on the core problems and generalised solutions which might yet exist in this complex space. If vulnerability and insecurity is an endemic and irreducible property of information systems as a function of the intractable presence of […]

Categories
technology

Information Technology is Implicitly Insecure

The discussion that no one appears willing to have is that from the very inception of these information technologies, doubt and uncertainty has been endemic and irreducible. Turing’s proof of the implicit undecidability of computation took its recursive cues from Gödel’s prime number shenanigans in the Incompleteness proof. These systems are first and foremost open […]

Categories
systems technology

Cybersecurity’s Unacknowledged Truth

The whole cybersecurity enterprise seems to be built upon a suite of psychological and culturally-reflexive assumptions that assert that there exists even a possibility of logical or systemic closure. No such closure or completion is possible and this is rarely acknowledged.

Categories
communication Philosophy technology

The Necessity of Proliferating Vulnerabilities: a General Philosophy of Cyber Security

Compressed: It is something of an inevitability of both logic and of physics that the more components a material system has – including the diverse and recombinatory abstractions and logic of algorithmic, information and energy-processing (i.e. computational) systems – the more disordered states of entropy that are also possible, indeed – probable within and as […]

Categories
technology

Cyber Insecurity: Endless Breaches

Context: New Data Breach Has Exposed Millions Of Fingerprint And Facial Recognition Records: Report There is an enigma here, far beyond the rank foolishness of keeping vast quantities of such sensitive data in an unencrypted format (see the linked article), there is a deeper problem. The more valuable any data is, the more incentive there […]