Here, vulnerabilities are flaws introduced by the vendor, in contrast to configuration which is controlled by the end-user.
Here, vulnerabilities are flaws introduced by the vendor, in contrast to configuration which is controlled by the end-user.
Date: June 23-25, 2025
Venue: Institute of Industrial Science (IIS), The University of Tokyo
kmlabcw.iis.u-tokyo.ac.jp/weis/2025/in...
Date: June 23-25, 2025
Venue: Institute of Industrial Science (IIS), The University of Tokyo
kmlabcw.iis.u-tokyo.ac.jp/weis/2025/in...
Random thoughts:
- None of the reports find the majority are caused by vulns/exploits
- How do some of these firms *not* have an "unknown" category
- Many categories are overlapping
- We really need a standardized schema @zakird.com
Random thoughts:
- None of the reports find the majority are caused by vulns/exploits
- How do some of these firms *not* have an "unknown" category
- Many categories are overlapping
- We really need a standardized schema @zakird.com
go.bsky.app/BgGNPep
go.bsky.app/BgGNPep
18% of tips/complaints that come to the SEC relate to crypto, even though the crypto market is less than 1% of all financial markets
www.sec.gov/newsroom/pre...
18% of tips/complaints that come to the SEC relate to crypto, even though the crypto market is less than 1% of all financial markets
www.sec.gov/newsroom/pre...
Our new article found that personal cyber insurance covers a range of online harms, including social media abuse.
"Why would money protect me from cyber bullying?": A Mixed-Methods Study of Personal Cyber Insurance
www.computer.org/csdl/proceed...
Our new article found that personal cyber insurance covers a range of online harms, including social media abuse.
"Why would money protect me from cyber bullying?": A Mixed-Methods Study of Personal Cyber Insurance
www.computer.org/csdl/proceed...
The paper looks at the role of hacker teams in the Chinese bug bounty ecosystem.
We very sadly lost Ross Anderson mid way through this project.
www.computer.org/csdl/proceed...
The paper looks at the role of hacker teams in the Chinese bug bounty ecosystem.
We very sadly lost Ross Anderson mid way through this project.
www.computer.org/csdl/proceed...
No surprise that the sociologists were more insightful than the economists.
marginalrevolution.com/marginalrevo...
No surprise that the sociologists were more insightful than the economists.
marginalrevolution.com/marginalrevo...
www.timeshighereducation.com/depth/how-br... @timeshighered.bsky.social
www.timeshighereducation.com/depth/how-br... @timeshighered.bsky.social
If you get a suspicious email then send it to report@phishing.gov.uk
If you get a suspicious email then send it to report@phishing.gov.uk
- Cyber insurance
- Cyber risk quantification
- Incident response
- Online tracking
I'm interested in understanding economic incentives and historical development using quantitative and qualitative methods.
- Cyber insurance
- Cyber risk quantification
- Incident response
- Online tracking
I'm interested in understanding economic incentives and historical development using quantitative and qualitative methods.