

{"id":2089,"date":"2013-02-19T00:08:23","date_gmt":"2013-02-19T05:08:23","guid":{"rendered":"http:\/\/rud.is\/b\/?p=2089"},"modified":"2013-02-19T00:08:23","modified_gmt":"2013-02-19T05:08:23","slug":"redux-reassessing-cyber-risks-as-a-security-strategy","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2013\/02\/19\/redux-reassessing-cyber-risks-as-a-security-strategy\/","title":{"rendered":"[REDUX] Reassessing Cyber Risks as a Security Strategy"},"content":{"rendered":"<p>I happened across [Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy](http:\/\/scholarcommons.usf.edu\/cgi\/viewcontent.cgi?article=1107&#038;context=jss) [PDF] when looking for something else at the [Journal of Strategic Security](http:\/\/scholarcommons.usf.edu\/jss\/) site and thought it was a good enough primer to annoy everyone with a tweet about it.<\/p>\n<p>The paper is&mdash;well&mdash;_kinda_ wordy and has a Flesch-Kincaid grade reading level of 16<sup>*<\/sup>, making well suited for academia, but not rapid consumption in this blog era we abide in. I promised some folks that I&#8217;d summarize it (that phrase always reminds me [of this](http:\/\/www.youtube.com\/watch?v=uwAOc4g3K-g)) and so I shall (try).<\/p>\n<p>The fundamental arguments are:<\/p>\n<p>&#8211; we underrate &#038; often overlook pre-existing software weaknesses (a.k.a. vulnerabilities)<br \/>\n&#8211; we undervalue the costs of cybercrime by focusing solely on breaches &#038; not including preventative\/deterrence costs<br \/>\n&#8211; we get distracted from identifying real threats by over-hyped ones<br \/>\n&#8211; we suck at information sharing (not enough of it; incomplete, at times; too many &#8220;standards&#8221;)<br \/>\n&#8211; we underreport incidents&mdash;and that this actually _enables_ attackers<br \/>\n&#8211; we need a centralized body to report incidents to<br \/>\n&#8211; we should develop a complete &#038; uniform taxonomy<br \/>\n&#8211; we must pay particular attention to vulnerabilities in critical infrastructure<br \/>\n&#8211; we must pressure governments &#038; vendors to take an active role in &#8220;encouraging&#8221; removing vulnerabilities from software during the SDLC, not after deployment<\/p>\n<p>The author discusses specific media references (there are a plethora of links in the endnotes) when it comes to hype and notes specific government initiatives when it comes to other topics such as incident handling\/threat sharing (the author has a definite UK slant).<\/p>\n<p>I especially liked this quote on threat actors\/actions\/motives &#038; information sharing:<\/p>\n<p>> _[the] distributed nature of the Internet can make it difficult to clearly attribute some incidents [as] criminal, terrorist actions, or acts of war. Consequently, to affirm that &#8220;the principal difference&#8221; between [these] &#8220;is in the attacker&#8217;s intent&#8221; is far too simplistic when many cyber-attackers cannot be identified. It is also quite simplistic to attribute financial motivation only to cyber criminals since terrorists can be motivated by monetary gain in order to finance their political actions. [An] added difficulty is that a pattern of cyber incidents may not reveal itself unless information is shared between the different stakeholders. For example, taken in isolation, a bank&#8217;s website being temporarily unavailable may look innocuous and not worth reporting to the competent agencies. Yet, when associated with other cyber incidents in which the victims and timeframe are similar, it may reveal a concerted effort to target a particular type of business or e-government resources, a pattern of behavior that could amount to crime (fraud, espionage) or terrorism if the motive can be established. Detection thus may depend on information being shared._<\/p>\n<p>She does spend quite a bit of ink on vulnerabilities. Some choice (shorter) quotes:<\/p>\n<p>> _[the] economic analysis adopted by software companies does not take into account (or not sufficiently) that the costs of non- secure software are significant, that these costs will be borne by others on the network and ultimately by themselves in clean-up operations_<\/p>\n<p>> _Of course, to fix the vulnerabilities after release is laudable; it is also commendable that those companies participate in huge clean-up operations of botnets like Microsoft did in 2010. However, there is nothing more paradoxical than Microsoft (and others) spending money to circumscribe the effects of the very vulnerabilities they contributed to create in the first place_<\/p>\n<p>She then concludes with suggesting that governments work with ISPs to actually severely restrict or disable internet connections of users found to be infected and contributing to spam\/botnets, positing that this will cause users to demand more out of software vendors or use the free market to shift their loyalties to other software providers who do more to build less vulnerable software.<\/p>\n<p>Again, I think it&#8217;s a good primer on the subject (despite some dubious analogies peppered throughout), but I also think there is too much focus on vulnerabilities and not enough on threat actors\/actions\/motives. I do like how she mixes economic theory into a topic that is usually defined solely in terms of warfare without diminishing the potential impacts of either.<\/p>\n<p>It would have been pretty evident to see the influence of Beck &#038; Giddens even if her references to [Risk Society](http:\/\/en.wikipedia.org\/wiki\/Risk_society) didn&#8217;t bookend the prose. I&#8217;ll leave you with what might just be her own one-sentence summary of the entire paper and definitely apropo for our current &#8220;cyber&#8221; situation:<\/p>\n<p>> _[the] risks that industrialization and modernization created tend to be global, systemic with a &#8220;boomerang effect,&#8221; and denied, overlooked, or overhyped._<\/p>\n<div style=\"border-top:1px dotted gray\"><sup>*<\/sup><span style=\"font-size:75%\"><i>Ironically enough, this blog post comes out at F\/K-level 22-23<\/i><\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>I happened across [Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy](http:\/\/scholarcommons.usf.edu\/cgi\/viewcontent.cgi?article=1107&#038;context=jss) [PDF] when looking for something else at the [Journal of Strategic Security](http:\/\/scholarcommons.usf.edu\/jss\/) site and thought it was a good enough primer to annoy everyone with a tweet about it. The paper is&mdash;well&mdash;_kinda_ wordy and has a Flesch-Kincaid grade reading level of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[681,3,650],"tags":[],"class_list":["post-2089","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-information-security","category-risk-management-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>[REDUX] Reassessing Cyber Risks as a Security Strategy - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2013\/02\/19\/redux-reassessing-cyber-risks-as-a-security-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[REDUX] Reassessing Cyber Risks as a Security Strategy - rud.is\" \/>\n<meta property=\"og:description\" content=\"I happened across [Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy](http:\/\/scholarcommons.usf.edu\/cgi\/viewcontent.cgi?article=1107&#038;context=jss) [PDF] when looking for something else at the [Journal of Strategic Security](http:\/\/scholarcommons.usf.edu\/jss\/) site and thought it was a good enough primer to annoy everyone with a tweet about it. The paper is&mdash;well&mdash;_kinda_ wordy and has a Flesch-Kincaid grade reading level of [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2013\/02\/19\/redux-reassessing-cyber-risks-as-a-security-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2013-02-19T05:08:23+00:00\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/02\\\/19\\\/redux-reassessing-cyber-risks-as-a-security-strategy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/02\\\/19\\\/redux-reassessing-cyber-risks-as-a-security-strategy\\\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"[REDUX] Reassessing Cyber Risks as a Security Strategy\",\"datePublished\":\"2013-02-19T05:08:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/02\\\/19\\\/redux-reassessing-cyber-risks-as-a-security-strategy\\\/\"},\"wordCount\":813,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"articleSection\":[\"Cybersecurity\",\"Information Security\",\"Risk Management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/02\\\/19\\\/redux-reassessing-cyber-risks-as-a-security-strategy\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/02\\\/19\\\/redux-reassessing-cyber-risks-as-a-security-strategy\\\/\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/02\\\/19\\\/redux-reassessing-cyber-risks-as-a-security-strategy\\\/\",\"name\":\"[REDUX] Reassessing Cyber Risks as a Security Strategy - rud.is\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\"},\"datePublished\":\"2013-02-19T05:08:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/02\\\/19\\\/redux-reassessing-cyber-risks-as-a-security-strategy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/02\\\/19\\\/redux-reassessing-cyber-risks-as-a-security-strategy\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2013\\\/02\\\/19\\\/redux-reassessing-cyber-risks-as-a-security-strategy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rud.is\\\/b\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"[REDUX] Reassessing Cyber Risks as a Security Strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rud.is\\\/b\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\\\/\\\/rud.is\"],\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/author\\\/hrbrmstr\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"[REDUX] Reassessing Cyber Risks as a Security Strategy - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2013\/02\/19\/redux-reassessing-cyber-risks-as-a-security-strategy\/","og_locale":"en_US","og_type":"article","og_title":"[REDUX] Reassessing Cyber Risks as a Security Strategy - rud.is","og_description":"I happened across [Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy](http:\/\/scholarcommons.usf.edu\/cgi\/viewcontent.cgi?article=1107&#038;context=jss) [PDF] when looking for something else at the [Journal of Strategic Security](http:\/\/scholarcommons.usf.edu\/jss\/) site and thought it was a good enough primer to annoy everyone with a tweet about it. The paper is&mdash;well&mdash;_kinda_ wordy and has a Flesch-Kincaid grade reading level of [&hellip;]","og_url":"https:\/\/rud.is\/b\/2013\/02\/19\/redux-reassessing-cyber-risks-as-a-security-strategy\/","og_site_name":"rud.is","article_published_time":"2013-02-19T05:08:23+00:00","author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2013\/02\/19\/redux-reassessing-cyber-risks-as-a-security-strategy\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2013\/02\/19\/redux-reassessing-cyber-risks-as-a-security-strategy\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"[REDUX] Reassessing Cyber Risks as a Security Strategy","datePublished":"2013-02-19T05:08:23+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2013\/02\/19\/redux-reassessing-cyber-risks-as-a-security-strategy\/"},"wordCount":813,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"articleSection":["Cybersecurity","Information Security","Risk Management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2013\/02\/19\/redux-reassessing-cyber-risks-as-a-security-strategy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2013\/02\/19\/redux-reassessing-cyber-risks-as-a-security-strategy\/","url":"https:\/\/rud.is\/b\/2013\/02\/19\/redux-reassessing-cyber-risks-as-a-security-strategy\/","name":"[REDUX] Reassessing Cyber Risks as a Security Strategy - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"datePublished":"2013-02-19T05:08:23+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2013\/02\/19\/redux-reassessing-cyber-risks-as-a-security-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2013\/02\/19\/redux-reassessing-cyber-risks-as-a-security-strategy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2013\/02\/19\/redux-reassessing-cyber-risks-as-a-security-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"[REDUX] Reassessing Cyber Risks as a Security Strategy"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-xH","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":776,"url":"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/","url_meta":{"origin":2089,"position":0},"title":"USDA Driving Towards Both Food Insecurity And Cyber-Insecurity?","author":"hrbrmstr","date":"2012-01-10","format":false,"excerpt":"It's rare that two of my passions\u2014food and information security\u2014intersect, but thanks to the USDA's announcement of their Blueprint For Stronger Service, I can touch on both in one post. In 2011, the Obama administration challenged all departments to reduce costs in a effort dubbed the \"Campaign to Cut Waste\".\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":583,"url":"https:\/\/rud.is\/b\/2011\/06\/14\/weis-2011-session-1-attacks-sex-lies-cyber-crime-survey\/","url_meta":{"origin":2089,"position":1},"title":"WEIS 2011 :: Session 1 :: Attacks :: Sex, Lies &#038; Cyber-crime Survey","author":"hrbrmstr","date":"2011-06-14","format":false,"excerpt":"Presentation [PDF]","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":637,"url":"https:\/\/rud.is\/b\/2011\/12\/01\/youre-the-mayor-of-fudville\/","url_meta":{"origin":2089,"position":2},"title":"You&#8217;re The Mayor of FUDville!","author":"hrbrmstr","date":"2011-12-01","format":false,"excerpt":"Rik Ferguson, Director Security Research at Trend Micro, had a great tweet early last Tueday morning calling out potential FUD in an article over at The Metro: Given the plethora of FUD-dropping in the article, I could only think of one way to do it justice, and that was a\u2026","rel":"","context":"In &quot;FUD&quot;","block_context":{"text":"FUD","link":"https:\/\/rud.is\/b\/category\/fud\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2665,"url":"https:\/\/rud.is\/b\/2013\/09\/15\/christian-science-monitor-text-layout-single-page-full-article-view\/","url_meta":{"origin":2089,"position":3},"title":"Christian Science Monitor Text Layout (Single Page Full Article View)","author":"hrbrmstr","date":"2013-09-15","format":false,"excerpt":"As I was about to \"buffer\" a reference to a CSM article on \"cyber war\" (below), I paused to look for a \"print view\" or some other icon that would let me show the whole article as a single page vs the annoying multi-page layout view they normally are presented\u2026","rel":"","context":"In &quot;hacks&quot;","block_context":{"text":"hacks","link":"https:\/\/rud.is\/b\/category\/hacks\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":12630,"url":"https:\/\/rud.is\/b\/2020\/01\/21\/davos-2020-world-economic-forum-2020-global-risk-report-cyber-cliffs-notes\/","url_meta":{"origin":2089,"position":4},"title":"Davos 2020 World Economic Forum 2020 Global Risk Report Cyber Cliffs Notes","author":"hrbrmstr","date":"2020-01-21","format":false,"excerpt":"Each year the World Economic Forum releases their Global Risk Report around the time of the annual Davos conference. This year's report is out and below are notes on the \"cyber\" content to help others speed-read through those sections (in the event you don't read the whole thing). Their expert\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":44636,"url":"https:\/\/rud.is\/b\/2026\/01\/10\/ai-proofing-your-it-cyber-career-the-human-only-capabilities-that-matter\/","url_meta":{"origin":2089,"position":5},"title":"AI Proofing Your It\/cyber Career: The Human Only Capabilities That Matter","author":"hrbrmstr","date":"2026-01-10","format":false,"excerpt":"In the past ~4 weeks I have personally observed some irrefutable things in \"AI\" that are very likely going to cause massive shocks to employment models in IT, software development, systems administration, and cybersecurity. I know some have already seen minor shocks. They are nothing compared to what's highly probably\u2026","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/rud.is\/b\/category\/ai\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/2089","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=2089"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/2089\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=2089"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=2089"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=2089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}