Cybersecurity Hour: Exploring the Cybersecurity Canon
Subscribe
Sign in
Home
Cybersecurity Canon - Hall of…
Archive
About
Latest
Top
Cybersec Canon Ep 10. The Cuckoo’s Egg - Chapters 42-47. The Trace is Completed, but no Arrest Yet
They get to know the hacker's phone number, but are not able to make an arrest because of a lack of evidence of classified information being stolen…
Mar 14
•
Rob, a bibliophile
1
Cybersec Canon Ep 9. The Cuckoo’s Egg - Chapter 37-41. The Hacker gets bolder, Cliff sets up a Bait
The true cost of a hack is not just data, it could human safety. Also it is possible to combine several unclassified data to uncover something…
Mar 10
•
Rob, a bibliophile
1
Cybersec Canon Ep 8. The Cuckoo’s Egg - Chapter 31-36. The Bremen Connection
Cliff finds out that the hacker logs in from the University of Bremen. The hacker is so methodical that someone wonders if he is human or not.
Mar 2
•
Rob, a bibliophile
February 2026
Cybersec Canon Ep 7. The Cuckoo’s Egg - Chapter 24-30. From Dead End to Transatlantic Connection
The breaches to most computers happen since accounts with default passwords are left unchanged.
Feb 14
•
Rob, a bibliophile
Cybersec Canon Ep 6. The Cuckoo’s Egg - Chapter 17-23. The Science of Tracing
Cliff uses physics to learn that the hacking is originating from outside of the US. He faces bureaucratic barriers and is frustrated at the inability to…
Feb 9
•
Rob, a bibliophile
November 2024
Cybersec Canon Ep 5. The Cuckoo’s Egg - Chapter 13-16. The CIA Gets Involved
Cliff works with the CIA. The hacker finds new ways to access more computers and sensitive data.
Nov 18, 2024
•
Rob, a bibliophile
Cybersec Canon Ep 4. The Cuckoo’s Egg - Chapter 9-12. Variety in Software Solutions
In the book Cliff Stoll makes the case for a diverse software ecosystem. But now, it seems like there is more consolidation and standardization than…
Nov 11, 2024
•
Rob, a bibliophile
Cybersec Canon Ep 3. The Cuckoo’s Egg - Chapter 5-8. Wiretapping at the Dawn of Cybersecurity
Exploring the privacy regulations in the US till the ECPA when wiretapping included digital communications.
Nov 2, 2024
•
Rob, a bibliophile
October 2024
Cybersec Canon Ep 2. The Cuckoo’s Egg - Chapter 3 & 4. The Hidden Cost of Custom Software Ecosystems
Building proprietary software stacks instead of relying on open-source or commercially available solutions has many benefits but also hidden costs.
Oct 27, 2024
•
Rob, a bibliophile
Cybersec Canon Ep 1. The Cuckoo’s Egg - Chapter 1 & 2. When Debugging Uncovers More Than Bugs
Debugging a production issue is quite rewarding and engaging.
Oct 19, 2024
•
Rob, a bibliophile
September 2023
Understanding Privacy-Enabling Technologies (PETs): More Than Just Digital Safeguards
PETs are a set of technologies that can be used to protect the privacy of individuals and also achieve compliance with data protection legislation and…
Sep 15, 2023
•
Rob, a bibliophile
The EU-US Data Privacy Framework: A New Era for Transatlantic Data Transfers
The EU-US DPF replaces the previous Privacy Shield framework, which was invalidated in 2020. It provides businesses with a way to transfer personal data…
Sep 14, 2023
•
Rob, a bibliophile
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts