Assembling cybersecurity: The politics and materiality of technical malware reports and the case of Stuxnet

September 26, 2019

This is an article about how cybersecurity gets “made,” with a focus on the role of commercial computer security firms in generating knowledge in matters of international cybersecurity. The argument is two-fold. Firstly, malware may be an intangible artefact in some ways, but its success and its interpretation as malware is deeply interwoven in social, technical, and material alliances.

Spotlight

Sense

At Sen.se, we believe there is no such thing as the Internet of Things.We rather believe in an Internet of Everything where Humans, Nature, Machines, Objects, Environments, Information, Physical and Virtual spaces all mix up, talk, intertwine, interact, enrich and empower each other in all sorts of ways. This is what we are building and we think that we are not alone.This is why we have created Open.Sen.se an open platform for all those who want to imagine, prototype and test new Devices, Installations, Scenarios, Applications for this globally interconnected and immersive world. Designers, developers, tinkerers, students, hobbyists, R&D departments, artists, self quantifiers, dataviz maniacs, whatever your skills are, we tried to make Open.Sen.se easy to use and yet powerful for you.

OTHER WHITEPAPERS
news image

Identity and Zero Trust: A Health-ISAC Guide for CISOS

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More
news image

Securing Water Utilities with AWS

whitePaper | March 3, 2023

Today, many U.S. water utilities want to implement cloud-based information technology (IT) and operational technology (OT) solutions to realize the operational and security benefits of the cloud. This whitepaper discusses the business drivers associated with cloud adoption in the U.S. Water Sector, cyber security trends, and outlines best practices for implementing cyber security controls at a water utility.

Read More
news image

API Security: Best Practices for Vulnerability Mitigation

whitePaper | June 6, 2023

API Security: Best Practices for Vulnerability Mitigation provides a hands-on approach to mitigate security vulnerabilities in APIs. The paper emphasizes the importance of implementing security measures that protect the API and underlying infrastructure. The paper identifies various security vulnerabilities that can arise in APIs and provides detailed guidelines for securing them. These guidelines cover authentication, authorization, input validation, output encoding, error handling, logging, and auditing.

Read More
news image

The Cyber Resilience Blueprint: A New Perspective on Security

whitePaper | December 15, 2019

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization.

Read More
news image

Building the next generation of security and privacy professionals

whitePaper | October 4, 2022

Organizational practices in the digital age are inevitably linked to the processing of data, and built upon the systems that support these efforts. Collectively, cybersecurity and privacy professionals are responsible for guiding and implementing organizational decisions that ensure data is collected, processed, protected and shared consistent with evolving norms.

Read More
news image

Symantec White Paper - The Cyber Resilience Blueprint: A New Perspective on Security

whitePaper | January 2, 2020

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization.

Read More

Spotlight

Sense

At Sen.se, we believe there is no such thing as the Internet of Things.We rather believe in an Internet of Everything where Humans, Nature, Machines, Objects, Environments, Information, Physical and Virtual spaces all mix up, talk, intertwine, interact, enrich and empower each other in all sorts of ways. This is what we are building and we think that we are not alone.This is why we have created Open.Sen.se an open platform for all those who want to imagine, prototype and test new Devices, Installations, Scenarios, Applications for this globally interconnected and immersive world. Designers, developers, tinkerers, students, hobbyists, R&D departments, artists, self quantifiers, dataviz maniacs, whatever your skills are, we tried to make Open.Sen.se easy to use and yet powerful for you.

Events