risk-management

29
Sep
Information Asymmetry and the 1950s Nuclear Bounty

Information Asymmetry and the 1950s Nuclear Bounty

Props to Matt Ploessel for calling out this one... I'd not heard of a bounty around nuclear weapons until today.
3 min read
29
Sep
Are you making a Walkman? Or an iPod?

Are you making a Walkman? Or an iPod?

When the walkman was introduced, it created a category. It's brand also became the term of description for that category.
3 min read
11
Sep
Techcrunch: Use ‘productive paranoia’ to build cybersecurity culture at your startup

Techcrunch: Use ‘productive paranoia’ to build cybersecurity culture at your startup

At TechCrunch Early Stage, we asked Casey Ellis, founder, chairman and chief technology officer at Bugcrowd, to share his ideas for how startups can improve their security posture.
6 min read
31
Aug
The Nth Country Experiment and Coincident Vulnerability Discovery

The Nth Country Experiment and Coincident Vulnerability Discovery

Nth Country Experiment - Nuclear MuseumCould any country with the right knowledge and technology build a nuclear bomb? From May
1 min read
29
Aug
Group Letter re IoT Cybersecurity Improvement Act (H.R. 1668)

Group Letter re IoT Cybersecurity Improvement Act (H.R. 1668)

We the undersigned cybersecurity companies and professionals write to express strong support for the IoT Cybersecurity Improvement Act (H.R. 1668). We respectfully urge you and your colleagues to support expedited passage of the bill before the end of the 116th Congress.
1 min read
27
Aug
Public Comment from Casey Ellis, Bugcrowd re DRAFT BOD 20-01

Public Comment from Casey Ellis, Bugcrowd re DRAFT BOD 20-01

Dear Director Krebs and CISA/DHS team, Thank you for the opportunity to comment on this Binding Operational Directive...
6 min read
09
Aug
Forbes: Accelerating secure software development

Forbes: Accelerating secure software development

7. Expect and plan for mistakes. Expect mistakes, and plan to capture and mitigate them quickly. After all, to err
1 min read
17
Jul
A few good cybersecurity companies

A few good cybersecurity companies

I spend a lot of time looking at cybersecurity solutions and companies, partly on request, and partly because it always fascinates me to see people are attempting to solve big problems.
4 min read
26
May
First principles

First principles

Simple is strong. Respect is key. Build it like you own it. Don’t be valuable, create value. Think like a hacker. 360-degree accountability.
1 min read
08
Apr
To err is human - Kerckhoffs' Principle in Software Transparency

To err is human - Kerckhoffs' Principle in Software Transparency

Shannon and Kerckhoff were pioneers of disclosure thinking — They understood the concept of “build it like it’s broken”. This was especially true in WWII cryptography, but it’s becoming increasingly clear in its relevance to the 'peacetime' software that we use today.
2 min read