Source: https://www.linkedin.com/feed/update/urn%3Ali%3Ashare%3A7009378339165528064
United States Senate: #Chairman of the #Senate #Intelligence #Committee, Senator Mark Warner, discusses the debate over #crypto #regulation and concerns about the use of #TikTok #data and #content [It’s the #Networks that Really Matter!]: https://lnkd.in/gTYNpfJj :
#ControlDoctrine #SocialInfluence #Command-#Control
Think Beyond #Apps, #Data, #Devices to #NetworkCentricComputing:
https://lnkd.in/gkuidttH :
#Beyond #Data: #Networks: #DataInMotion #DataInUse #DataAtRest: #Data-#Integration-#Flow Across #Networks:
https://lnkd.in/gFn4Vm2 : https://lnkd.in/g5mNWUVK
Post-Doc #ZeroTrust #Network & #Computer #Security #Thesis: https://lnkd.in/gyQSx6n: “Everyone is a potential target, potential accessory, or even a potential source of attack, even when they are unwilling or unknowing participants in any given attack or a ‘ #network of #attacks ’.” (p. 16):
#ZeroTrust addresses shortcomings of #perimeter #centric #strategies… there is no default trust for any #entity—including #users, #devices, #applications, and #packets—regardless of what it is and its location on or relative to the corporate #network.”
Unlike other risks, #cyber #risk poses a uniquely different set of #exposures being intertwined with the #medium and the #message in #digital #network #communications… More significant and latent cyber risk is in inherent and potential #vulnerabilities in the enabling #medium such as the underlying operating system or networking software.
From #TrustComputing perspective, every component of #software, #hardware, #firmware, or #networks… is vulnerable and exposed. Once compromised, any such trusted user regardless of the status on the respective hierarchy can become the channel of #contagion that can compromise the complete #network of #trust as well as all other trusted users on those networks.
#JADC2 #Engineering #Networks & #Social #Networks of #Command & #Control #C2: C4I-Cyber.com: #C2 Supremacy – Beyond #AI & #Quantum #Supremacy: https://lnkd.in/g6PqheNw
C4I-Cyber.com: Beyond C2 to Adversarial & Counter-adversarial C2:
#AI #Performance: #Beyond #Data #Hardware #Software #Models: https://lnkd.in/ghnyyME4
#Space #Hacked: #Myths of ‘Un-hackable’ #Quantum #Crypto: ALREADY BROKEN #QKD https://lnkd.in/gdX8x69Z
#SocioTechnical #NetworkCentricComputing R&D Leading Practices:
Where #Telecom #Networks #Engineering Meets #Social #Engineering:
#Command #Control #Influence #Adversarial #Counteradversarial:
#KM #AI #ML #Quant #Cyber #Crypto #Quantum #Risk #Computing:
#Telecom #Networks:
SSRN 99 Top-10 R&D Rankings: Top 1% Authors: https://lnkd.in/ec99Zkd
#SocialNetworks:
Google Scholar: 10,000+ Citations: https://lnkd.in/eErtK5mU
YouTube Presentations:
#AWS #NewYorkState #Pentagon #SiliconValley #WallStreet https://lnkd.in/gMR596dj
Silicon Valley’s Next Big Thing™: CEO-CTO-CFO Know-Build-Monetize™ Networks: Join The CxO Metaverse™
Global Risk Management Network LLC: Silicon Valley-Wall Street-Pentagon Digital CEO-CTO-CFO Networks