There is no way to turn this clock back. I dont want to turn it back. We need to recognize inherent in each virtue, and i summarized them on the side, is the risk. To the degree that i concentrate or communicate or take people out of the loop, et cetera, to the degree i buy the benefits of this technology and each and everyone of those steps i introduced security consequences that are, give risk, give rise to greater risk, the virtue of the system is intertwined with its limitation, its liabilities and its risk. That is fundamental. It is not just that the complexity of the system gives me these problems. One reason Technology Fixes just dont get me there, every time i buy more security i tend to do so in ways that are involving sacrifice of virtues. I want to spend a minute having talked about software to say a little bit about hardware because the hardware insecurities are quite, quite real as well. Youre aware of that. Easy example i can give is just people tend to think about suppl
Interfacing to bring technologies and give abilities to our war fighters, men and women in uniform. There are a couple that are important. The first is relationships and expense. We brought together 18 that has spent a lot of time in places where innovation and Venture Capital money is being spent. We have folks that have come, spent a lot of time in the labs, that have seen and understood how y so we are able to interface with them. That is key. The second big lesson is we are focused on capability gaps. What are transformational transformational ways we can use to apply to our program. The final key piece is having agility is one of the most important things. We are able to bring that with the funding and the oversight we have for the pentagon, thats when we see something that could add value for war fighters, we are able to execute quickly. Aaron matta we hear a lot from people similar in a duty to yours, that it moves slower than the commercial side. How do you manage to get a dod
There is also multiple capture the flag contests which is basically red team, blue team, offense, defense, how do you hack something, how do you defend something. How do you get certain targeted treasure chests. And, some of the level of skill in these competitions are what we normally say can only be done by nation states. And instead, you have hundreds and thousands of people who are engaging in these types of contests. I think that can satisfactorily bust a myth, only nationstate adversary what we have to be worried about. When the tools and techniques are available to everybody, it is very, very easy to take advantage of them. We also had an iot village, internet of things village. One of the highlights for me was that Remote Controllable wheelchair. I dont know why you would want to remotely control a wheelchair but somebody made this thing. And it was driving up and down the halls without anybody on it because somebody figured out how to gain access and control it and drive it ar
/PRNewswire/ The Linux Foundation and the Open Source Software Security Foundation (OpenSSF) brought together over 90 executives from 37 companies and.
The Ethics of Zero-Day Exploits: The NSA Meets the Trolley Car acm.org - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from acm.org Daily Mail and Mail on Sunday newspapers.