To Forecast Global Cyber Alliances, Just Follow the Money (Part 3): Moving...
Cyber AlliancesNational Security Next week’s APEC summit may, in addition to providing great insight into economic collaborative trends, serve as a harbinger to subsequent cyber collaboration. If the...
View ArticleBack to the Future: Leveraging the Delorean to Secure the Information...
Cyber WarriorsNational Security In the cult classic trilogy Back to the Future, Doc claims, “Where we’re going, we don’t need roads.” He’s referencing 2015, and his assertion reminds us just how...
View ArticleChallenges in Data-Driven Security (Part 1)
Data Science DEFCON 22 was a great learning experience for me. My goal was to soak up as much information security knowledge as possible to complement my existing data science experience. I grew more...
View ArticleSoft Power is Hard: The World Internet Conference Behind the Great Firewall
National Security For three days, Chinese citizens are able to tweet at will and access Google, Facebook, and other forms of social media and traditionally censored content—but only if they are in the...
View ArticleIs This the Beginning of the End of “Duel”-track Foreign Policy?
National Security The Iranian nuclear negotiations occupy a persistent spot in the foreign policy news cycle. The Associated Press recently reported that Iran has agreed to a list of nuclear...
View ArticleBlurred Lines: Dispelling the False Dichotomy between National & Corporate...
National Security Several US government agencies have experienced targeted cyber attacks over the last few months. Many believe China is responsible for cyber attacks on the Office of Personnel...
View ArticleUnderstanding Crawl Data at Scale (Part 1)
Big DataClusteringData Science A couple of years ago, in an effort to better understand technology trends, we initiated a project to identify typical web site characteristics for various geographic...
View ArticleThe Fog of (Cyber) War: The Attribution Problem and Jus ad Bellum
National Security The Sony Pictures Classics film The Fog of War is a comprehensive and seemingly unfiltered examination of former Secretary of Defense Robert McNamara, highlighting the key lessons he...
View ArticleThe Year Ahead in Cyber: Endgame Perspectives on 2015
Data ScienceNational SecurityThreat Intelligence From the first CEO of a major corporation resigning in the wake of a cyber attack, to NATO incorporating the cyber realm into Article 5, to the still...
View ArticleCould a Hollywood Breach and Some Tweets Be the Tipping Point for New Cyber...
Cyber LegislationNational Security Two months ago, near-peer cyber competitors breached numerous government systems. During this same time, China debuted its new J-31 stealth fighter jet, which has...
View ArticleUnderstanding Crawl Data at Scale (Part 2)
Big DataClusteringData Science Effective analysis of cyber security data requires understanding the composition of networks and the ability to profile the hosts within them according to the large...
View ArticleUnderstanding Crawl Data at Scale (Part 3)
Big DataClusteringData Science In Understanding Crawl Data at Scale (Part 2), I demonstrated using SOM to visualize a high-dimensional dataset and use the technique to help reduce the dimensionality....
View ArticleA Martian's Take on Cyber in the National Security Strategy
National Security In the recent New York Times bestselling book, The Martian, Andy Weir depicts a future world where space travel to Mars is feasible. Through an unfortunate string of events, the...
View ArticleFive Thoughts from the White House Summit on Cybersecurity and Consumer...
Adversary IntelligenceThreat Intelligence The Obama Administration deserves credit for putting together the first-ever White House summit on cybersecurity on Friday and – contrary to what some media...
View ArticleStreaming Data Processing with PySpark Streaming
Data Science Streaming data processing has existed in our computing lexicon for at least 50 years. The ideas Doug McIlroy presented in 1964 regarding what would become UNIX pipes have been revisited,...
View ArticleRepression Technology: An Authoritarian Whole of Government Approach to...
Digital Statecraft Last week, as discussions of striped dresses and llamas dominated the headlines, academia and policy coalesced in a way that rarely happens. On February 25th, Director of National...
View ArticleHacking the Glass Ceiling
Women in Technology As we approach International Women’s Day this week and edge closer to the 100th anniversary of women’s suffrage (okay, four years to go, but still, a remarkable moment), and as news...
View ArticleBeyond the Buzz: Integrating Big Data & User Experience for Improved Cyber...
Big DataUser Experience Big Data and UX are much more than industry buzzwords—they are some of the most important solutions making sense of the ever-increasing complexity and dynamism of the...
View ArticleSee Your Company Through the Eyes of a Hacker: Turning the Map Around On...
Active ResponseAdversary IntelligenceTurn the Map Around Today, Harvard Business Review published “See Your Company Through the Eyes of a Hacker: Turning the Map Around On Cybersecurity” by Endgame CEO...
View ArticleData-Driven Strategic Warnings: The Case of Yemeni ISPs
Big DataNational Security In 2007, a flurry of denial of service attacks targeted Estonian government websites as well as commercial sites, including banks. Many of these Russian-backed attacks were...
View Article