summarylogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--.SRCINFO14
-rw-r--r--PKGBUILD23
-rw-r--r--cybersuntzu3068
3 files changed, 3105 insertions, 0 deletions
diff --git a/.SRCINFO b/.SRCINFO
new file mode 100644
index 000000000000..7e83439bf735
--- /dev/null
+++ b/.SRCINFO
@@ -0,0 +1,14 @@
+pkgbase = fortune-mod-cybersuntzu
+ pkgdesc = #Cyber Sun Tzu fortune cookie file
+ pkgver = 1
+ pkgrel = 1
+ url = https://twitter.com/suntzucyber
+ arch = any
+ groups = fortune-mods
+ license = custom:PublicDomain
+ depends = fortune-mod
+ source = cybersuntzu
+ sha256sums = 21c1e38e68925ff46214b7d1fbeb2f2b578bc88bdc0c9cd97d29d80a3c45567d
+
+pkgname = fortune-mod-cybersuntzu
+
diff --git a/PKGBUILD b/PKGBUILD
new file mode 100644
index 000000000000..7499cd4ddf73
--- /dev/null
+++ b/PKGBUILD
@@ -0,0 +1,23 @@
+# Maintainer: Mauro Andreolini <mauro.andreolini@gmail.com>
+
+pkgname=fortune-mod-cybersuntzu
+pkgver=1
+pkgrel=1
+pkgdesc="#Cyber Sun Tzu fortune cookie file"
+arch=('any')
+license=('custom:PublicDomain')
+url="https://twitter.com/suntzucyber"
+depends=('fortune-mod')
+groups=('fortune-mods')
+
+source=('cybersuntzu')
+sha256sums=('21c1e38e68925ff46214b7d1fbeb2f2b578bc88bdc0c9cd97d29d80a3c45567d')
+
+build() {
+ strfile ${srcdir}/cybersuntzu ${srcdir}/cybersuntzu.dat
+}
+
+package() {
+ install -D -m644 ${srcdir}/cybersuntzu ${pkgdir}/usr/share/fortune/cybersuntzu
+ install -D -m644 ${srcdir}/cybersuntzu.dat ${pkgdir}/usr/share/fortune/cybersuntzu.dat
+}
diff --git a/cybersuntzu b/cybersuntzu
new file mode 100644
index 000000000000..f54a93c068d0
--- /dev/null
+++ b/cybersuntzu
@@ -0,0 +1,3068 @@
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+A cyber warrior only allows that which is needed. A cyber master
+questions why it is needed.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not expose your weaknesses to the enemy; firewall judiciously.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+A key to victory in cyberwar is detecting and disabling protracted
+adversary operations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+The whole secret to cyberwar lies in confusing the enemy, so that he
+cannot fathom our real defenses.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Manage flows out of the network as closely as those allowed in to defeat
+the persistent cyber adverary
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The competent cyber warrior learns from their mistakes. The cyber
+master learns from the mistakes of others.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary sees your networked systems as points on a map with
+many routes between them.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Always be on the lookout for single points of failure that the cyber
+adversary can leverage in attacks.
+ -- Sun Tzu, The Art of Cyber War
+%
+Authorized 'hacking back' will enable previously unrealized asymmetries
+for the cyber adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Management will not provide additional budget based on ancient quotes on
+Powerpoint presentations.
+ -- Sun Tzu, The Art of Cyber War
+%
+The fog of war is thick on the cyber battlefield
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+All warfare is based on deception and cyber attribution is a shit show
+ -- Sun Tzu, The Art of Cyber War
+%
+A diligent risk register is an invaluable roadmap for the cyber
+adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not check your risk register prior to attacking.
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber expert in battle seeks his victory from strategic advantage
+and does not demand it from his SOC.
+ -- Sun Tzu, The Art of Cyber War
+%
+Unlike on a battlefield, the cyber adversary always lives to attack
+again.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your enemy cares not that the maintainer of an Internet-connected server
+left 10 years ago.
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber adversary's tactics flow like water, seeking the path of least
+resistance. Plan accordingly.
+ -- Sun Tzu, The Art of Cyber War
+%
+Cyber deterrence creates the next decade's malware problem.
+ -- Sun Tzu, The Art of Cyber War
+%
+If you know your network and your systems, you need not fear the result
+of a hundred cyber battles.
+ -- Sun Tzu, The Art of Cyber War
+%
+Do not rely too heavily on the skill of the common person to detect
+attacks. The adversary can quickly adapt.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Every cyber battle is won before it is fought
+ -- Sun Tzu, The Art of Cyber War
+%
+The cyber master knows how varied a path the adversary can walk between
+systems, across the network
+ -- Sun Tzu, The Art of Cyber War
+%
+Many great cyber battles were lost by warriors who failed to understand
+the methods of the adversary.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+Defeat wrought by known vulnerabilities is doubly painful in the media
+ -- Sun Tzu, The Art of Cyber War
+%
+In the midst of chaos, there is opportunity for your adversary. Remain
+focused and organized in the face of chaos.
+ -- Sun Tzu, The Art of Cyber War
+%
+One does not simply walk into cyber Mordor.
+ -- Sun Tzu, The Art of Cyber War
+%
+The enemy does not care what systems were in scope for testing. Protect
+your weak points.
+ -- Sun Tzu, The Art of Cyber War
+%
+Your adversary does not wait for you to finish patching.
+ -- Sun Tzu, The Art of Cyber War
+%
+Great results can be achieved by small teams focused on the correct
+actions
+ -- Sun Tzu, The Art of Cyber War
+%
+Most APTs are not very advanced
+ -- Sun Tzu, The Art of Cyber War
+%