<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>evergreen on Privacy, Power, &amp; Protection In The Cyber Century</title>
    <link>https://blog.eutopian.io/tags/evergreen/</link>
    <description>Recent content in evergreen on Privacy, Power, &amp; Protection In The Cyber Century</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-gb</language>
    <copyright>All rights reserved - 2017</copyright>
    <lastBuildDate>Tue, 07 May 2019 11:00:30 +0000</lastBuildDate><atom:link href="https://blog.eutopian.io/tags/evergreen/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>The Projectionist</title>
      <link>https://blog.eutopian.io/the-projectionist/</link>
      <pubDate>Tue, 07 May 2019 11:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/the-projectionist/</guid>
      <description>750 words, 3 minutes. The reason I don’t post on Cyber Security current affairs?
It&amp;rsquo;s a scramble to be first.
 If I&amp;rsquo;m to write something, what should it be? What&amp;rsquo;s my angle? Which lens do I use on the microscope, or since this is a mass medium, the projector? What film can I show you that you haven&amp;rsquo;t already seen a dozen times? I&amp;rsquo;ll attempt to answer these questions here, and in so doing introduce what may become a new thread of posts.</description>
    </item>
    
    <item>
      <title>Documenting Breaches With H Diagrams</title>
      <link>https://blog.eutopian.io/documenting-breaches-with-h-diagrams/</link>
      <pubDate>Wed, 17 Apr 2019 12:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/documenting-breaches-with-h-diagrams/</guid>
      <description>1500 words, 6 minutes. “For the sake of brevity, we will always represent this number by the letter e” - Leonhard Euler, Mechanica. 1736. Illustration Pub. 1881.
What if you could understand and explain any breach 10x faster? Security breaches are a staple of mainstream news. In the past, details only emerged through technical analysis, research papers, and the forensic review of press releases. Occasionally we’d be gifted with a customer letter or the suspicious timing of a patch or update.</description>
    </item>
    
    <item>
      <title>Attack Surface Reduction By Dynamic Compilation</title>
      <link>https://blog.eutopian.io/attack-surface-reduction-by-dynamic-compilation/</link>
      <pubDate>Thu, 21 Mar 2019 12:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/attack-surface-reduction-by-dynamic-compilation/</guid>
      <description>1850 words, 7 minutes.
&amp;hellip;or, how the cave fish lost his eyes. Iranocypris typhlops - 1944, By B.Coad for Bruun &amp;amp; Kaiser.
This post follows directly from the last. In that post, we learned that everyone could do something to reduce their attack surface and decrease the likelihood of a breach. I&amp;rsquo;m going to show you what that winning system looks like when taken to its ultimate logical conclusion. The logic goes something like this:</description>
    </item>
    
    <item>
      <title>Winning Systems &amp; Security Practitioners 7. Attack Surface Reduction</title>
      <link>https://blog.eutopian.io/winning-systems-security-practitioners-7.-attack-surface-reduction/</link>
      <pubDate>Sun, 17 Feb 2019 14:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/winning-systems-security-practitioners-7.-attack-surface-reduction/</guid>
      <description>2000 words, 7 1/2 minutes.
Attack Surface Reduction Illustrerad verldshistoria utgifven av E. Wallis. volume I. 1875-9.
“Out of every hundred men, ten shouldn&amp;rsquo;t be there, eighty are just targets”
Heraclitus 535 - 475 BC.
 My posts on Winning Systems for Cyber Security Practitioners are my most popular. In them, I attempt to change your perspective on the relative importance of products and skills in securing what&amp;rsquo;s precious to you.</description>
    </item>
    
    <item>
      <title>Geopolitics For Fun &amp; Profit</title>
      <link>https://blog.eutopian.io/geopolitics-for-fun-profit/</link>
      <pubDate>Thu, 25 Oct 2018 08:38:04 +0100</pubDate>
      
      <guid>https://blog.eutopian.io/geopolitics-for-fun-profit/</guid>
      <description>1750 words, 7 minutes. Sketch by Sir William Rothenstein, 1933.
&amp;ldquo;Who rules East Europe commands the Heartland. Who rules the Heartland commands the World-Island. Who rules the World-Island commands the world.&amp;quot;
- Sir Halford Mackinder, Democratic Ideals and Reality. 1919.
 Do you work in technology, are you building a company? You should think about how your product or service fits with the wider world because aligning with large movements is a winning system.</description>
    </item>
    
    <item>
      <title>A Universal Lemma For Compliance</title>
      <link>https://blog.eutopian.io/a-universal-lemma-for-compliance/</link>
      <pubDate>Mon, 27 Aug 2018 19:38:04 +0100</pubDate>
      
      <guid>https://blog.eutopian.io/a-universal-lemma-for-compliance/</guid>
      <description>2500 words, 9 1/2 minutes. Matthew Hopkins, Witchfinder General. 1647 Engraving.
Here I describe a lemma1 or helping theorem for technical compliance of IT with a focus on Information Security.
It&amp;rsquo;s an approach for all compliance regimes whether regulatory or corporate. It doesn&amp;rsquo;t date, nor is it predicated on a technology or platform. It isn&amp;rsquo;t a trick. It doesn&amp;rsquo;t provide cover for inadequate security or incompetent staff. If you&amp;rsquo;re looking to evade compliance, disguise incompetence, or shirk accountability then you&amp;rsquo;re in the wrong article.</description>
    </item>
    
    <item>
      <title>The Largest Open Goal In Cyber Security</title>
      <link>https://blog.eutopian.io/the-largest-open-goal-in-cyber-security/</link>
      <pubDate>Wed, 01 Aug 2018 10:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/the-largest-open-goal-in-cyber-security/</guid>
      <description>1000 words, 4 minutes. &amp;ldquo;But how was one to explain repeated instances of derisive laughter at melodramas and films that hardly set out to be funny?&amp;quot; - Prof. Eric Rentschler1
 Out of place laughter is an anarchist in the dark. Someone who refuses to let the film cast its spell.
 Imagery is important. Moving or still. Whether it be religious iconography, depictions of national myth, a coat of arms, a rallying military standard, your company&amp;rsquo;s brand, or something as incidental as clip art.</description>
    </item>
    
    <item>
      <title>An Idea Whose Time Has Come</title>
      <link>https://blog.eutopian.io/an-idea-whose-time-has-come/</link>
      <pubDate>Thu, 17 Aug 2017 10:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/an-idea-whose-time-has-come/</guid>
      <description>950 words, 4 1/2 minutes. Hugo by Étienne Carjat, 1876
&amp;ldquo;Nothing is as powerful as an idea whose time has come.&amp;quot; - Victor Hugo.
This is the second of two posts on strategic software. The first explained what it is, what it does, and where to find it. Now I&amp;rsquo;ll tell you why it&amp;rsquo;s an idea whose time has come. I&amp;rsquo;ll tell you why it will be more powerful in some respects than traditional politics and how it will come to shape the world.</description>
    </item>
    
    <item>
      <title>The Age Of Strategic Software</title>
      <link>https://blog.eutopian.io/the-age-of-strategic-software/</link>
      <pubDate>Tue, 15 Aug 2017 10:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/the-age-of-strategic-software/</guid>
      <description>1300 words, 5 minutes.
Belloc by E. O. Hoppé, 1915.
&amp;ldquo;Whatever happens, we have got the Maxim gun, they have not.&amp;quot; - Hilaire Belloc.
Once upon a time software was just for counting beans. It counted more beans faster and cheaper than anything else. Then computers became personal, then portable, then pocketable. All sorts of different kinds of software were created to serve the people and help them do their jobs better.</description>
    </item>
    
    <item>
      <title>Beating The Samson Option</title>
      <link>https://blog.eutopian.io/beating-the-samson-option/</link>
      <pubDate>Thu, 27 Jul 2017 10:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/beating-the-samson-option/</guid>
      <description>1300-1600 words, 6 1/2 to 8 1/2 minutes.
An Etching of Samson by Julius Schnorr von Carolsfeld, from an 1882 German Bible.
&amp;ldquo;He grasped two pillars of the temple and bowed himself with all his might&amp;rdquo; - Judges 16:30.
Introduction This post is about online services which rely partly, or wholly, on user-contributed content. It&amp;rsquo;s about what happens to that content if those services close.
I&amp;rsquo;ll examine the constraints and motivations of the parties involved.</description>
    </item>
    
    <item>
      <title>Winning Systems &amp; Security Practitioners 6. Final Remarks</title>
      <link>https://blog.eutopian.io/winning-systems-security-practitioners-6.-final-remarks/</link>
      <pubDate>Fri, 30 Jun 2017 15:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/winning-systems-security-practitioners-6.-final-remarks/</guid>
      <description>550 words, 2 minutes.
Final Remarks &amp;ldquo;All men can see the tactics whereby I conquer, but what none can see is the strategy out of which victory is evolved&amp;rdquo; - Sun Tzu.
This is the 6th and final post in a short series on winning systems for security practitioners. The first postfeels like a while ago already, about 6000 words or 25 minutes. Those minutes haven&amp;rsquo;t been wasted.
The Inevitable Car Analogy If you&amp;rsquo;ve come this far then you&amp;rsquo;ve already completed one whole lap around the circuit of winning systems.</description>
    </item>
    
    <item>
      <title>Winning Systems &amp; Security Practitioners 5. Resilience</title>
      <link>https://blog.eutopian.io/winning-systems-security-practitioners-5.-resilience/</link>
      <pubDate>Fri, 30 Jun 2017 14:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/winning-systems-security-practitioners-5.-resilience/</guid>
      <description>1450 words, 5 1/2 minutes.
Resilience &amp;ldquo;In defeat: Defiance&amp;rdquo; - Winston S. Churchill.
This is part 5 of 6 in a short series of posts on winning systems for Information Security practitioners. It aims to plug the gap between policy and products and put you, the practitioner, back in the driving seat. After all if you don&amp;rsquo;t know what system you&amp;rsquo;re implementing, how can you decide what products or features are important to you?</description>
    </item>
    
    <item>
      <title>Winning Systems &amp; Security Practitioners 4. Robustness</title>
      <link>https://blog.eutopian.io/winning-systems-security-practitioners-4.-robustness/</link>
      <pubDate>Fri, 30 Jun 2017 13:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/winning-systems-security-practitioners-4.-robustness/</guid>
      <description>1200 words, 5 minutes.
Robustness &amp;ldquo;The first virtue in a soldier is endurance of fatigue.&amp;quot; - Napoleon Bonaparte.
This is part 4 of 6 in a short series of posts on winning systems for Information Security practitioners. It aims to plug the gap between policy and products and put you, the practitioner, back in the driving seat. After all if you don&amp;rsquo;t know what system you&amp;rsquo;re implementing, how can you decide what products or features are important to you?</description>
    </item>
    
    <item>
      <title>Winning Systems &amp; Security Practitioners 3. Responsiveness</title>
      <link>https://blog.eutopian.io/winning-systems-security-practitioners-3.-responsiveness/</link>
      <pubDate>Fri, 30 Jun 2017 12:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/winning-systems-security-practitioners-3.-responsiveness/</guid>
      <description>1100 words, 4 1/2 minutes.
Responsiveness &amp;ldquo;No battle plan ever survives contact with the enemy&amp;rdquo; - Helmuth von Moltke.
This is part 3 of 6 in a short series of posts on winning systems for Information Security practitioners. It aims to plug the gap between policy and products and put you, the practitioner, back in the driving seat. After all if you don&amp;rsquo;t know what system you&amp;rsquo;re implementing, how can you possibly decide what products or features are important to you?</description>
    </item>
    
    <item>
      <title>Winning Systems &amp; Security Practitioners 2. Preparation</title>
      <link>https://blog.eutopian.io/winning-systems-security-practitioners-2.-preparation/</link>
      <pubDate>Fri, 30 Jun 2017 11:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/winning-systems-security-practitioners-2.-preparation/</guid>
      <description>1100 words, 4 1/2 minutes.
Preparation &amp;ldquo;One of the best ways to keep peace is to be prepared for war&amp;rdquo; - Plato &amp;amp; others.
Today attacks come thick and fast. The chances are that all public IPv4 address space is regularly scanned. Time-to-compromise of an unpatched, non-firewalled, Microsoft Windows host is about 5 minutes. Systems are attacked not because they are valuable, but because they are vulnerable. Even an old cable-modem is a useful addition to a botnet.</description>
    </item>
    
    <item>
      <title>Winning Systems &amp; Security Practitioners 1. Introduction</title>
      <link>https://blog.eutopian.io/winning-systems-security-practitioners-1.-introduction/</link>
      <pubDate>Fri, 30 Jun 2017 10:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/winning-systems-security-practitioners-1.-introduction/</guid>
      <description>1100 words, 4 1/2 minutes.
Introduction &amp;ldquo;Never tell people how to do things. Tell them what to do and they will surprise you with their ingenuity.&amp;quot; - George S. Patton
If you&amp;rsquo;ve read my previous postyou&amp;rsquo;ll know that to get beneficial, long lasting, low-maintenance results in Information Security, you need winning systems. Not skills. If you like grinding monotony punctuated by periods of extreme stress and being able to tell people how busy you constantly are, you can safely return to your to-do list.</description>
    </item>
    
    <item>
      <title>Forget Solving The Cyber Security Skills Shortage</title>
      <link>https://blog.eutopian.io/forget-solving-the-cyber-security-skills-shortage/</link>
      <pubDate>Fri, 30 Jun 2017 09:00:30 +0000</pubDate>
      
      <guid>https://blog.eutopian.io/forget-solving-the-cyber-security-skills-shortage/</guid>
      <description>1100 words, 4 minutes. This post is one of a short series on structural and systemic things the Information Security industry does wrong, and what we might do about them.
Disclaimer: I advocate lifelong learning, that includes professional training, product training, workshops, online or in-person courses, and academic study. The professional trainers I know who author and deliver their own material are among the most mentally agile people I&amp;rsquo;ve ever met.</description>
    </item>
    
  </channel>
</rss>
