A cybersecurity visualisation tool at the Idaho National Laboratory. Credit: inl/Flickr, CC BY 2.0
Credit: inl/Flickr, CC BY 2.0


When asked about the origins of The America‘s hit single ‘A horse with no name’ (1971), lyricist Dewey Bunnell said he wanted to capture the spirit of the hot, all-too familiarly dry desert around Arizona and California, which he’d drive through as a kid. The horse was a vehicle that’d take him through the desert and away from the chaos of life.

Cybersecurity sounds like it could be that horse, in the form of IT infrastructure to effectively defend against the desert of cyber-weaponry, except we’ve probably only just seen a foal. When software is weaponised and used in cyber-attacks, we’re confronted with a threat we’ve not fully understood yet and which we’re in no real position to understand, let alone effectively defend against. At the same time, even in this inchoate form, cyber-weapons are posing threats that we better defend against or risk the shutdown of critical services. The only clear way forward seems to be of survival, on an ad hoc basis. Not surprisingly, the key to understanding cybersecurity’s various challenges for its innumerable stakeholders lies in knowing what a cyber-weapon, a peril of the desert, is.

We don’t know.

Read the full article here.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s