{"id":272,"date":"2015-11-22T13:18:02","date_gmt":"2015-11-22T13:18:02","guid":{"rendered":"\/?p=272"},"modified":"2015-11-20T13:21:01","modified_gmt":"2015-11-20T13:21:01","slug":"better-software-for-cybersecurity","status":"publish","type":"post","link":"http:\/\/www.softwarefordomainexperts.com\/?p=272","title":{"rendered":"Better software for cybersecurity"},"content":{"rendered":"<p>How can cybersecurity be improved with better software?<\/p>\n<p>Let&#8217;s start with the experts who have the task of spotting something going on which shouldn&#8217;t be &#8211; running corporate or government systems.<\/p>\n<p>Setting a key performance indicator &#8211; known attacks per day, percent of attacks known to be succesful &#8211; is a start, but not very helpful.<\/p>\n<p>This is a task where experience is enormously helpful &#8211; peple know what to look for, what the patterns are, what to see.<\/p>\n<p>Ideally you&#8217;d have a knowledge base of people&#8217;s experiences with different attacks, how it was done, how it was spotted.<\/p>\n<p>Then you could build software which would automatically scan for suspicious activity as described and flag it up.<\/p>\n<p>This would be a lot of building software, adapting software, gathering stories about people&#8217;s experiences, showing the right experience at the right time, continually building a knowledge base which connects and indexes to the scanning and detecting.<\/p>\n<p>That&#8217;s not how this software is usually built, I think!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How can cybersecurity be improved with better software? Let&#8217;s start with the experts who have the task of spotting something going on which shouldn&#8217;t be &#8211; running corporate or government systems. Setting a key performance indicator &#8211; known attacks per day, percent of attacks known to be succesful &#8211; is a start, but not very [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-272","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"http:\/\/www.softwarefordomainexperts.com\/index.php?rest_route=\/wp\/v2\/posts\/272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.softwarefordomainexperts.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.softwarefordomainexperts.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.softwarefordomainexperts.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.softwarefordomainexperts.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=272"}],"version-history":[{"count":1,"href":"http:\/\/www.softwarefordomainexperts.com\/index.php?rest_route=\/wp\/v2\/posts\/272\/revisions"}],"predecessor-version":[{"id":273,"href":"http:\/\/www.softwarefordomainexperts.com\/index.php?rest_route=\/wp\/v2\/posts\/272\/revisions\/273"}],"wp:attachment":[{"href":"http:\/\/www.softwarefordomainexperts.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.softwarefordomainexperts.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=272"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.softwarefordomainexperts.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}