Create an Account
username: password:
 
  MemeStreams Logo

serious games

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
serious games
Topic: Miscellaneous 9:13 pm EDT, Oct 28, 2015

David Jarvis:

CISOs and other security leaders are asking, "How do I assess the real security risks to my company? How can I best communicate that risk to the broader organization and manage expectations? Even if I succeed at that, do I have the skills, resources and tools for success?" These are all important questions.

Richard Bejtlich:

The administration should develop the capability to take asymmetric actions that target adversary core interests, but in a way that leverages our strengths against their weaknesses.

Lisa Monaco:

We are not where we need to be in terms of federal cybersecurity.

David Sanger:

The ultimate Russian hack on the United States could involve severing the fiber-optic cables at some of their hardest-to-access locations ... where the cables are hard to monitor and breaks are hard to find and repair.

Steven Bellovin:

There's good evidence that people are playing serious malicious games with the routing table.

James Suroweicki:

The only way to win the game is simply not to play.



 
 
Powered By Industrial Memetics
RSS2.0