Fighting an Asymmetrical Cyber War– Why We Need to Take A Different Approach
Pascal's View
NOVEMBER 20, 2009
… An apparently perfect device can provide a safe harbor for numerous threats– in the form of old and vulnerable chip designs, Trojan horses, or kill switches– that are difficult or impossible to detect.” government waits, the more devastating the eventual assault is likely to be.” government.
Let's personalize your content