Expert corner

 
 
(IN)SECURE Magazine
icosahedral

Cyber threat analysis in complex adaptive systems

The use of wartime analogies in cybersecurity is common in our industry. Sun Tzu is often quoted in presentations and papers to emphasize an author’s key point. I will spare you that in this article; however, I would like to introduce the idea …

Don't miss

Malware news

Black Hat USA 2017

 
(IN)SECURE Magazine