Links for Resilience #2

Security In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc - The New York Times This is a good reminder that the tools and processes we create may not remain in our control forever. Our threat models should include considering who might get access, whether due to espionage, bankruptcy/foreclosure, acquisition, leadership change, etc. How might they use and abuse those assets? What protections do we have in place?

Read →

Loading…