

{"id":776,"date":"2012-01-10T14:58:00","date_gmt":"2012-01-10T19:58:00","guid":{"rendered":"http:\/\/rud.is\/b\/?p=776"},"modified":"2017-04-02T22:51:15","modified_gmt":"2017-04-03T03:51:15","slug":"usda-driving-towards-both-food-insecurity-and-cyber-insecurity","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/","title":{"rendered":"USDA Driving Towards Both Food Insecurity And Cyber-Insecurity?"},"content":{"rendered":"<p>It&#8217;s rare that two of my passions\u2014food and information security\u2014intersect, but thanks to the USDA&#8217;s announcement of their <span class=\"removed_link\" title=\"https:\/\/blogs.usda.gov\/2012\/01\/09\/a-blueprint-for-stronger-service\/\">Blueprint For Stronger Service<\/span>, I can touch on both in one post.<\/p>\n<p>In 2011, the Obama administration challenged all departments to reduce costs in a effort dubbed the &#8220;<a href=\"https:\/\/obamawhitehouse.archives.gov\/the-press-office\/2011\/06\/13\/executive-order-13576-delivering-efficient-effective-and-accountable-gov\">Campaign to Cut Waste<\/a>&#8220;. In response, the USDA has managed to trim annual expenses by $150 million through a number of efforts. One such effort is to close <strong>259 domestic USDA offices<\/strong> (you can see which states are impacted below).<\/p>\n<p><center><a href=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/01\/BPSS-Map.jpeg?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"777\" data-permalink=\"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/bpss-map\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/01\/BPSS-Map.jpeg?fit=700%2C541&amp;ssl=1\" data-orig-size=\"700,541\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"BPSS-Map\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/01\/BPSS-Map.jpeg?fit=300%2C231&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/01\/BPSS-Map.jpeg?fit=510%2C394&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/01\/BPSS-Map-300x231.jpg?resize=300%2C231&#038;ssl=1\" alt=\"\" title=\"BPSS-Map\" width=\"300\" height=\"231\" class=\"aligncenter size-medium wp-image-777\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/01\/BPSS-Map.jpeg?resize=300%2C231&amp;ssl=1 300w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/01\/BPSS-Map.jpeg?w=700&amp;ssl=1 700w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><\/p>\n<p>I&#8217;m going to expand on why this is a bad idea over at <span class=\"removed_link\" title=\"http:\/\/rud.is\/f\">#nom<\/span> later this week, but 2011 was <em>not<\/em> a <a href=\"http:\/\/www.foodpoisonjournal.com\/foodborne-illness-outbreaks\/2011-a-bad-year-for-e-coli-listeria-and-salmonella-outbreaks---here-is-to-2012\/\">good<\/a> <a href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_foodborne_illness_outbreaks_in_the_United_States#2011\">year<\/a> in terms of controlling food poisoning in the United States and I don&#8217;t think closing offices will make for better oversight.<\/p>\n<p>Other efforts focus on the elimination of redundancies and inefficiencies. The Blueprint has 27 initial (or to-be-implemented immediately) improvements that include the following:<\/p>\n<ul>\n<li>Consolidate more than 700 cell phone plans into about 10\n<\/li>\n<li>Standardize civil rights training and purchases of <b>cyber security products<\/b>\n<\/li>\n<li>Centralize civil rights, human resource, procurement, and property management functions\n<\/li>\n<\/ul>\n<p>So, they were either getting gouged by suppliers (unlikely since there is negotiated pricing for the government) or the USDA&#8217;s &#8220;cyber-security&#8221; strategy was severely fragmented (and, thus, broken) enough that even finance folks could see the problem. Regardless of the source, it had to be pretty bad to make it to the top three of 27 immediate items (and called out in every sub-department press release) and even more so amongst over 160 initiatives that are being or have been put in place.<\/p>\n<p>I still cannot find the details of the plan or budget analysis that went into the focus on cyber security products (links appreciated if you have them), but as private organizations continue their efforts to defend against existing and emerging threats, it might be worth a look at your strategy and spend a bit more closely. Would your infosec department be included in a similar list if your organization went through such a sweeping cost-cutting analysis program? Is your portfolio of security products as optimized as it can be? Could you use a budget sweep as an opportunity to leap frog your security capabilities (e.g. move to whitelisting vs signature-based anti-malware) vs just pressure your existing vendors and re-negotiate contracts?<\/p>\n<p>Unfortunately, the government being the government, I&#8217;m now even more concerned that the USDA may need to worry about increased infections on both the food-level <i>and<\/i> the &#8220;cyber&#8221; level.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s rare that two of my passions\u2014food and information security\u2014intersect, but thanks to the USDA&#8217;s announcement of their Blueprint For Stronger Service, I can touch on both in one post. In 2011, the Obama administration challenged all departments to reduce costs in a effort dubbed the &#8220;Campaign to Cut Waste&#8220;. In response, the USDA has [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[3],"tags":[215,199,449,610,608,609,612,618,615,611,369,614,606,738,607,421,617,616,266,613],"class_list":["post-776","post","type-post","status-publish","format-standard","hentry","category-information-security","tag-cellular-telephone","tag-computer-security","tag-cyber","tag-cyber-security-products","tag-even-finance-folks","tag-food","tag-food-poisoning","tag-food-security","tag-humanitarian-aid","tag-increased-infections","tag-national-security","tag-obama-administration","tag-property-management","tag-security","tag-security-products","tag-united-states","tag-united-states-department-of-agriculture","tag-urban-agriculture","tag-usd","tag-usda"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>USDA Driving Towards Both Food Insecurity And Cyber-Insecurity? - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"USDA Driving Towards Both Food Insecurity And Cyber-Insecurity? - rud.is\" \/>\n<meta property=\"og:description\" content=\"It&#8217;s rare that two of my passions\u2014food and information security\u2014intersect, but thanks to the USDA&#8217;s announcement of their Blueprint For Stronger Service, I can touch on both in one post. In 2011, the Obama administration challenged all departments to reduce costs in a effort dubbed the &#8220;Campaign to Cut Waste&#8220;. In response, the USDA has [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2012-01-10T19:58:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-04-03T03:51:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/01\/BPSS-Map-300x231.jpg\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"USDA Driving Towards Both Food Insecurity And Cyber-Insecurity?\",\"datePublished\":\"2012-01-10T19:58:00+00:00\",\"dateModified\":\"2017-04-03T03:51:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/\"},\"wordCount\":424,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"image\":{\"@id\":\"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/01\/BPSS-Map-300x231.jpg\",\"keywords\":[\"cellular telephone\",\"Computer security\",\"Cyber\",\"cyber security products\",\"even finance folks\",\"food\",\"food poisoning\",\"Food security\",\"Humanitarian aid\",\"increased infections\",\"National security\",\"Obama administration\",\"property management\",\"Security\",\"security products\",\"United States\",\"United States Department of Agriculture\",\"Urban agriculture\",\"USD\",\"USDA\"],\"articleSection\":[\"Information Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/\",\"url\":\"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/\",\"name\":\"USDA Driving Towards Both Food Insecurity And Cyber-Insecurity? - rud.is\",\"isPartOf\":{\"@id\":\"https:\/\/rud.is\/b\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/01\/BPSS-Map-300x231.jpg\",\"datePublished\":\"2012-01-10T19:58:00+00:00\",\"dateModified\":\"2017-04-03T03:51:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/#primaryimage\",\"url\":\"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/01\/BPSS-Map-300x231.jpg\",\"contentUrl\":\"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/01\/BPSS-Map-300x231.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/rud.is\/b\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"USDA Driving Towards Both Food Insecurity And Cyber-Insecurity?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/rud.is\/b\/#website\",\"url\":\"https:\/\/rud.is\/b\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/rud.is\/b\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\/\/rud.is\"],\"url\":\"https:\/\/rud.is\/b\/author\/hrbrmstr\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"USDA Driving Towards Both Food Insecurity And Cyber-Insecurity? - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/","og_locale":"en_US","og_type":"article","og_title":"USDA Driving Towards Both Food Insecurity And Cyber-Insecurity? - rud.is","og_description":"It&#8217;s rare that two of my passions\u2014food and information security\u2014intersect, but thanks to the USDA&#8217;s announcement of their Blueprint For Stronger Service, I can touch on both in one post. In 2011, the Obama administration challenged all departments to reduce costs in a effort dubbed the &#8220;Campaign to Cut Waste&#8220;. In response, the USDA has [&hellip;]","og_url":"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/","og_site_name":"rud.is","article_published_time":"2012-01-10T19:58:00+00:00","article_modified_time":"2017-04-03T03:51:15+00:00","og_image":[{"url":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/01\/BPSS-Map-300x231.jpg","type":"","width":"","height":""}],"author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"USDA Driving Towards Both Food Insecurity And Cyber-Insecurity?","datePublished":"2012-01-10T19:58:00+00:00","dateModified":"2017-04-03T03:51:15+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/"},"wordCount":424,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"image":{"@id":"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/01\/BPSS-Map-300x231.jpg","keywords":["cellular telephone","Computer security","Cyber","cyber security products","even finance folks","food","food poisoning","Food security","Humanitarian aid","increased infections","National security","Obama administration","property management","Security","security products","United States","United States Department of Agriculture","Urban agriculture","USD","USDA"],"articleSection":["Information Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/","url":"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/","name":"USDA Driving Towards Both Food Insecurity And Cyber-Insecurity? - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/#primaryimage"},"image":{"@id":"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/01\/BPSS-Map-300x231.jpg","datePublished":"2012-01-10T19:58:00+00:00","dateModified":"2017-04-03T03:51:15+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/#primaryimage","url":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/01\/BPSS-Map-300x231.jpg","contentUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/01\/BPSS-Map-300x231.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2012\/01\/10\/usda-driving-towards-both-food-insecurity-and-cyber-insecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"USDA Driving Towards Both Food Insecurity And Cyber-Insecurity?"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-cw","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":2089,"url":"https:\/\/rud.is\/b\/2013\/02\/19\/redux-reassessing-cyber-risks-as-a-security-strategy\/","url_meta":{"origin":776,"position":0},"title":"[REDUX] Reassessing Cyber Risks as a Security Strategy","author":"hrbrmstr","date":"2013-02-19","format":false,"excerpt":"I happened across [Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy](http:\/\/scholarcommons.usf.edu\/cgi\/viewcontent.cgi?article=1107&context=jss) [PDF] when looking for something else at the [Journal of Strategic Security](http:\/\/scholarcommons.usf.edu\/jss\/) site and thought it was a good enough primer to annoy everyone with a tweet about it. The paper is\u2014well\u2014_kinda_ wordy and has a\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":583,"url":"https:\/\/rud.is\/b\/2011\/06\/14\/weis-2011-session-1-attacks-sex-lies-cyber-crime-survey\/","url_meta":{"origin":776,"position":1},"title":"WEIS 2011 :: Session 1 :: Attacks :: Sex, Lies &#038; Cyber-crime Survey","author":"hrbrmstr","date":"2011-06-14","format":false,"excerpt":"Presentation [PDF]","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":44636,"url":"https:\/\/rud.is\/b\/2026\/01\/10\/ai-proofing-your-it-cyber-career-the-human-only-capabilities-that-matter\/","url_meta":{"origin":776,"position":2},"title":"AI Proofing Your It\/cyber Career: The Human Only Capabilities That Matter","author":"hrbrmstr","date":"2026-01-10","format":false,"excerpt":"In the past ~4 weeks I have personally observed some irrefutable things in \"AI\" that are very likely going to cause massive shocks to employment models in IT, software development, systems administration, and cybersecurity. I know some have already seen minor shocks. They are nothing compared to what's highly probably\u2026","rel":"","context":"In &quot;AI&quot;","block_context":{"text":"AI","link":"https:\/\/rud.is\/b\/category\/ai\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":637,"url":"https:\/\/rud.is\/b\/2011\/12\/01\/youre-the-mayor-of-fudville\/","url_meta":{"origin":776,"position":3},"title":"You&#8217;re The Mayor of FUDville!","author":"hrbrmstr","date":"2011-12-01","format":false,"excerpt":"Rik Ferguson, Director Security Research at Trend Micro, had a great tweet early last Tueday morning calling out potential FUD in an article over at The Metro: Given the plethora of FUD-dropping in the article, I could only think of one way to do it justice, and that was a\u2026","rel":"","context":"In &quot;FUD&quot;","block_context":{"text":"FUD","link":"https:\/\/rud.is\/b\/category\/fud\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9397,"url":"https:\/\/rud.is\/b\/2018\/04\/03\/2018-ieee-security-privacy-filtered-paper-dump\/","url_meta":{"origin":776,"position":4},"title":"2018 IEEE Security &#038; Privacy (Filtered) Paper Dump","author":"hrbrmstr","date":"2018-04-03","format":false,"excerpt":"The 2018 IEEE Security & Privacy Conference is in May but they've posted their full proceedings and it's better to grab them early than to wait for it to become part of a paid journal offering. There are alot of papers. Not all match my interests but (fortunately?) many did\u2026","rel":"","context":"In &quot;AppSec&quot;","block_context":{"text":"AppSec","link":"https:\/\/rud.is\/b\/category\/appsec\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2665,"url":"https:\/\/rud.is\/b\/2013\/09\/15\/christian-science-monitor-text-layout-single-page-full-article-view\/","url_meta":{"origin":776,"position":5},"title":"Christian Science Monitor Text Layout (Single Page Full Article View)","author":"hrbrmstr","date":"2013-09-15","format":false,"excerpt":"As I was about to \"buffer\" a reference to a CSM article on \"cyber war\" (below), I paused to look for a \"print view\" or some other icon that would let me show the whole article as a single page vs the annoying multi-page layout view they normally are presented\u2026","rel":"","context":"In &quot;hacks&quot;","block_context":{"text":"hacks","link":"https:\/\/rud.is\/b\/category\/hacks\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/776","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=776"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/776\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=776"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=776"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=776"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}