| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Description: “It’s a trope among security professionals that other humans – mere mundanes – don’t “”get”" security, and make foolish decisions. The human operating system has programmed itself over the last 50,000 years in ways that are understandable and manipulable.. We can dynamically reconfigure human wetware to cause them to act and react in more desirable ways.
Armed with these tools, the discerning organizational hacker can treat a group of humans as we would any other legacy distributed system; one which we can upgrade and modify to solve problems in more desirable ways! Beware, though, for these systems are Byzantine, complex, and are resistant to clumsy reprogramming efforts.” Bio: http://www.csoandy.com/
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast