Richard Bejtlich is one of the top cybersecurity professionals in the world. He discusses technical issues in a manner that makes sense to a non-techie. That would be me. It is my guess, dear reader, that this would also be you.
I have interviewed Richard Bejtlich at length on two occasions. I am an avid follower of his blog for the thrillers I write.
On his TaoSecurity blog, he writes on topics of interest to "the hunters", those who defend U. S. government and corporations against foreign hackers and internal intruders.
Bejtlich is former Air Force Intelligence and as a civilian, was formerly the top cybersecurity professional at Mandiant, the company called in to fix the biggest and most damaging breaches. He was the head of the team that positively identified a PLA Army site as the source of major intrusions. His report led to the indictment of five named PLA hackers.
(See my previous blog on the Mandiant Report in the archives.)
Here is the quote at the top of his blog post about a recent article about the Chinese writing their own code. Read the full post at the web address below.
"Periodically I read about efforts by China, or Russia, or North Korea, or other countries to replace American software with indigenous or semi-indigenous alternatives. I then reply via Twitter that I love the idea, with a short reason why.
"This post will list the top five reasons why I want China and other likely targets of American foreign intelligence collection to run their own software."
https://taosecurity.blogspot.com/2017/03/five-reasons-i-want-china-running-its.html
Read More
I have interviewed Richard Bejtlich at length on two occasions. I am an avid follower of his blog for the thrillers I write.
On his TaoSecurity blog, he writes on topics of interest to "the hunters", those who defend U. S. government and corporations against foreign hackers and internal intruders.
Bejtlich is former Air Force Intelligence and as a civilian, was formerly the top cybersecurity professional at Mandiant, the company called in to fix the biggest and most damaging breaches. He was the head of the team that positively identified a PLA Army site as the source of major intrusions. His report led to the indictment of five named PLA hackers.
(See my previous blog on the Mandiant Report in the archives.)
Here is the quote at the top of his blog post about a recent article about the Chinese writing their own code. Read the full post at the web address below.
"Periodically I read about efforts by China, or Russia, or North Korea, or other countries to replace American software with indigenous or semi-indigenous alternatives. I then reply via Twitter that I love the idea, with a short reason why.
"This post will list the top five reasons why I want China and other likely targets of American foreign intelligence collection to run their own software."
https://taosecurity.blogspot.com/2017/03/five-reasons-i-want-china-running-its.html
Read More