The National Institute of Standards and Technology (NIST), working collaboratively across a broad range of stakeholders, released a Cybersecurity Framework in February 2014. This framework, based on the functions of Protect, Detect and Response, has been adopted as a common model for actions for highly performing cyber security operations. The response portion of the cybersecurity […]
Cyber Strategy and the Dunning-Kruger Effect: Could some policymakers be too unskilled to recognize their ineptitude?
The Dunning–Kruger effect is a cognitive bias manifesting in unskilled individuals suffering from illusory superiority, mistakenly rating their ability much higher than is accurate. This bias is attributed to a metacognitive inability of the unskilled to recognize their ineptitude (from Wikipedia). The phenomenon was first tested in a series of experiments published in 1999 by David Dunning and Justin Kruger of the […]
Throughout 2012, Iran targeted United States banks and companies with a series of distributed denial-of-services cyber attacks. The attacks doubled and sometimes tripled the amount of traffic that the American websites were capable of handling. Many considered the attacks retaliation, revenge for the destruction wrought by Stuxnet on Iran’s nuclear program. The cyber attacks presented […]
How Can We Retain The Jedi Masters Of Federal IT In Government Service? Yodas Require Big Missions To Serve
If you follow federal IT you more than likely already read Steve O’Keeffe. But if you are new to this world you can find him at http://MeriTalk.com Last week he treated his followers to a nicely written piece which used metaphors from the Titanic (but in this case, the USS ITanic).This is a great overview […]