How to irregular cyber warfare
Somebody (@thegrugq) pointed me to this article on "Lessons on Irregular Cyber Warfare", citing the masters like Sun Tzu, von Clausewitz, Mao, Che, and the usual characters. It tries to answer:...as an insurgent, which is in a weaker power position vis-a-vis a stronger nation state; how does cyber warfare plays an integral part in the irregular cyber conflicts in the twenty-first century between nation-states and violent non-state actors or insurgenciesI thought I'd write a rebuttal.
None of these people provide any value. If you want to figure out cyber insurgency, then you want to focus on the technical "cyber" aspects, not "insurgency". I regularly read military articles about cyber written by those, like in the above article, which demonstrate little experience in cyber.
The chief technical lesson for the cyber insurgent is the Birthday Paradox. Let's say, hypothetically, you go to a party with 23 people total. What's the chance that any two people at the party have the same birthday? The answer is 50.7%. With a party of 75 people, the chance rises to 99.9% that two will have the same birthday.
The paradox is that your intuitive way of calculating Continue reading

The company said it’s using service providers as its SD-WAN sales channel and banking on large managed services deals.
The news comes as major cloud providers including AWS, Microsoft, and IBM are competing for a $10 billion, 10-year cloud contract from the U.S. Department of Defense.



SDxCentral Weekly Wrap for October 12, 2018. Apple and Amazon deny they were the victims of an elaborate spying plan by the Chinese government.
The company will now give IT workers that are transferring to Infosys the option of receiving an exit package if they decline to move to the outsourcing firm.
Netsurion, a newcomer to the SD-WAN market, has found its niche in the market as it builds its SD-WAN as integrated secure connectivity service.
The startup developed a type of composable infrastructure that focuses specifically on computing resources.
CenturyLink becomes an expert Microsoft Azure MSP; Huawei debuts a series of AI chips; Google releases its alert center for security threats.
