Software Engineering Daily

Attack Attribution with John Davis

Software Engineering Daily

When a cyber attack occurs, how do we identify who committed it? There is no straightforward answer to that question. Even if we know Chinese hackers have infiltrated our power grid with logic bombs, we might not be able to say with certainty whether those hackers were state actors or rogue Chinese hackers looking for an offensive asset to sell to their government. Even if we know someone in Russia

Continue reading...

Next Episodes

Software Engineering Daily

Car and IoT Security with Chris Craig @ Software Engineering Daily

📆 2017-09-06 11:00 / 00:55:56




Software Engineering Daily

Healthcare AI with Cosima Gretton @ Software Engineering Daily

📆 2017-09-01 11:00 / 00:49:06