Fighting an Asymmetrical Cyber War– Why We Need to Take A Different Approach
Pascal's View
NOVEMBER 20, 2009
… An apparently perfect device can provide a safe harbor for numerous threats– in the form of old and vulnerable chip designs, Trojan horses, or kill switches– that are difficult or impossible to detect.” networks, an approach that is very different from the current path that the U.S. is following. “ WESLEY K.
Let's personalize your content