Mind Matters Natural and Artificial Intelligence News and Analysis

TagCybersecurity (computing defense potential)

Online Security Technology

What’s Wrong With Cybersecurity Technology?

Know your enemy: The target isn’t networks, computers, or users; they are pathways to the target —gaining control of data

Veteran software developer David A. Kruger offered some thoughts on computer security recently at Expensivity and we appreciate the opportunity to republish them here. He starts with “Root Cause Analysis 101” Now we’ll apply the lessons learned in yesterday’s discussion to cybersecurity: Lesson Learned 1: A pattern of multiple types of recurring related failures indicates the presence of an unidentified root cause. In cybersecurity, is there a pattern of multiple types of recurring failures that appear to be related? Yes! A cybersecurity failure occurs whenever a cyberattacker gains control of data and then:  1) views or plays it, 2) steals copies of it, 3) ransoms it, 5) impedes its flow, 5) corrupts it, or 6) destroys it. The lesson learned is that the…