Is cyber security a complex game? Of course, it (i.e cyber) is all a game – of probability, of information entropy, of indefinitely-extensible logical or material systems and of successfully negotiating the vast and hyper-inflating, self-gravitating referential spaces of technology, communication and psychological or socioeconomic and ideological motivations that provide momentum here. To attenuate an […]
Consider the many ways that the cyber arms-race is precisely this – a procedurally-incremental measure, counter-measure, counter-counter-measure. The hyper-inflating combinatorial possibility space of attack and defence as a gestalt creates it’s own momentum and self-propagating, patterned structure(s) and open or extensible system(s). The evolutionary nature of this process is inescapable. Each act of interdiction then […]
Context: Like many other Governments around the world, the Australian Government is seeking to use mobile device tracking technology to assist suppressing the COVID-19 virus through contact tracing. The Australian Government has found itself as a valuable pawn in a corporate game of power and profiteering. The Australian people have found themselves and their data […]
During this shared Global challenge that is the COVID-19 pandemic and now – much more than ever before – the internet is our critical information lifeline and tether to the world. How well is the internet coping with such a sudden and massive hyper-inflation of demand? The internet of popular imagination is an omnipresent amorphous […]
The endless unravelling of assurance at one end of this cryptographic tapestry is simultaneously the enduring incentive, obligation and functional necessity of creating more sophisticated and impermeable logical entanglements at the other end. A question which springs to mind is as to the plausible inevitability of an acceleration of applied human or machine intelligence overtaking […]
Cyber security is now just a part of everyday life. Update, update, update… all this requires is a sufficiently entertaining marketing campaign to elaborate and celebrate the fulfilment of a life spent in the gamified Panopticon of endless technical paranoia and system updates; sitcoms and lifestyle gurus explaining the invaluable personal experience of incessant technical […]
It may be a matter of social and psychological necessity that this kind of monumental existential threat – to which we have perhaps long been desensitised by repetition and the droning monotony of unnecessarily adversarial ideological and political competition – carry more impact, more information entropy and cultural gravity when they become a tangible, material, […]
It is so often the case that the strength and the weakness of a technological or organisational system exist in (and as) that same structural and logical artefacts. The indefinite (recursive) extensibility of all material and logical systems is the foundation of, and cause for, this enigmatic duality.
The whole cybersecurity enterprise seems to be built upon a suite of psychological and culturally-reflexive assumptions that assert that there exists even a possibility of logical or systemic closure. No such closure or completion is possible and this is rarely acknowledged.
The Nasdaq will now be protected by a centaur team of human analysts and deep learning systems. The broader context of autonomous network and data system defence is clearly an accelerating arms race. If there is sufficient perceived benefit to be derived to offset the cost of development, which – as the pursuit of profit […]
Cyber security is a fascinating and rapidly evolving problem-space. What possible solutions exist in regards to coordinated governance and oversight? If a centralised software and hardware development methodology iss used – compliance to formal standards could be assured but the (logically and materially inevitable) emergence of vulnerability and exploit would mean that this systemic coherence […]
Here is some interesting content on the topic of identifying fake news and media content Verifying online information: The absolute essentials. Related to this – AI is rapidly becoming proficient at generating compelling, targeted falsehoods and dissimulating sources across diverse media artefacts, channels and contexts. In information security there is a turn towards entirely automated […]