Sublime
An inspiration engine for ideas
Stock-market fraud, steganography and cyberattacks…in 1834! The fascinating tale of Blanc brothers
Andrea Fortunaandreafortuna.org
One of the problems with a rescue operation of this magnitude is that the existing systems are untrustworthy. Nobody wants to reactivate malware and allow it to destroy data that has already been restored. So, Maersk wiped all the data on all of their laptops. Next, they proceeded to update the operating system on all workstations.
Mikko Hyppönen • If It's Smart, It's Vulnerable
The truth is that in today’s hyperconnected world, maturity-based cybersecurity programs are no longer adequate for combatting cyberrisks. A more strategic, risk-based approach is imperative for effective and efficient risk management (Exhibit 2).
Jim Boehm • The Risk-Based Approach to Cybersecurity
Continuous Monitoring : Dynamic recalculation of the CRQ to monitor the impact of security improvements and emerging threats allows you to adapt your strategy as the threat landscape and enterprise architecture evolve.
Rik Ferguson • The Cybersecurity Resilience Quotient Measuring Security Effectiveness
On the Internet, what is possible becomes mandatory.
Andrey Miroshnichenko • Human as Media. The Emancipation of Authorship
Ray Dalio • Principles: Life and Work
Notification volatility.
Löwy Juval • Righting Software
