Loosely applying an infamous thought experiment to the Internet

Warning! — Risk of Future Blackmail Ahead

Roko’s Basilisk

Back in 2010, the user Roko on the philosophy-oriented blog site LessWrong posted a thought experiment concerning an all-powerful AI construct. To briefly summarize, this AI would be incentivized to devise a means to…

Automation as a Permanent Stopgap

The use of artificial intelligence and machine learning is already well-established within cybersecurity. Such systems are commonly used to extract, process, and disseminate large amounts of information quickly, often in the pursuit of developing more accurate intrusion detection heuristics. Automation is also used in active…

Reconstructing the Education Pipeline

As the cybersecurity industry grows into young adulthood, serious consideration must be given when imagining the future. While new tools and techniques are developed to improve the quality of organizational cyber security, the advancement of technology will be meaningless without the existence of a workforce capable…

Cyber Frameworks and the Delineation of Roles

Addressing the cyber jobs gap requires not only the training of relevant skills, but the organization of these skills into roles that enable an organization to attain operational completeness. Such delineation assists industry managers by dividing responsibilities into manageable categories that reduce ambiguity…

Part Three of the Remediation Series

As previously established, an organizations cybersecurity doctrine is centered around disrupting the cyber-attack process, aka “killing the chain.” The ability for a potential victim to carry out this Kill Chain strategy depends largely on personnel and their collective KSA body. Entities that can build…

On Kill Chains, Threat Cycles, and the Cybersecurity Process

Part Two of the Remediation Series

For the purpose of framing the discussion on what hard and soft skills industry leaders request prospective applicants possess, let us first understand what the typical cybersecurity process entails. Establishing a standard model will afford…

A Concise Review of the Advised Skills, Policies, and Reforms Needed to Fill the Gap

In the preceding series of articles, we examined the social, economic, political, and educational factors that lead to the creation of the Cybersecurity jobs gap. The current state of the industry began in 2007 in…

Education Factor

As the previous articles have established, the question concerning the cybersecurity jobs gap is more than just numbers. It is more than demand simply exceeding supply. In reality, the employment disparity is a skills disparity; a disconnect between what the industry needs and what is available. With the…

Economic Factor

When examining the economic factors that have contributed to the cybersecurity employment gap, it is helpful to view jobs as commodities. And, like any other commodities market, the jobs market is subject to the same universal law of supply and demand. This law provides a foundation from which…

Social Factor

Cultural History

While the influence of politics is perhaps the most overt factor, the path it has taken may reflect a broader social factor. Within the frame of time previously established (1970-present), we must understand how national culture, media, social psychology, and practicality created a social climate that…

Cyber Nullius

B.S. in Cybersecurity | CSAP | CNVP | CNSP | CySA+ | Pentest+ | Security+ | Network+ | CTCE | Humble Beginner | Hopeful Space Traveler

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store