HorkosBurning and Bridges II: Turla BoogalooTurla’s Terrible, Horrible, No Good, Very Bad Couple of Years4 min read·May 9, 2023----
HorkosCyber(war) Persuasion FatigueThe perception of foreign doctrinal adherence does not automatically equate to fulfillment of operational standards of success for effects.4 min read·May 6, 2023----
HorkosStop Huffing About Cyber RetaliationHandwringing about the credibility of threats to impose costs in cyber contests misunderstands how those contests actually function.4 min read·Jul 13, 2021----
HorkosCyber Espionage as Mischief ManagedHarry Potter can teach us something about cyber threat actors who accept the risks that accompany spying on blue team personnel.5 min read·Apr 2, 2021--2--2
HorkosGiving the Adversary an Extra VoteHyperbole in threat-framing creates an exploitable condition that gives adversaries an easy way to mess with our heads.5 min read·Mar 8, 2021----
HorkosThe Incoherence of Cyber DeterrenceI love to repeat myself: deterring cyber espionage is a fantasy and cyberattack delivery can only at imperfectly deterred at best.5 min read·Feb 22, 2021----
HorkosPressing Problems and Slippery Slopes: Developing an Offensive Response to RansomwareWhile I don’t think JDAMs are the answer to ransomware, we need a real discussion about responsible pursuit of other offensive solutions.3 min read·Feb 5, 2021----
HorkosA Last Clever Knot?Newly disclosed Russian cyber activity targeting US government networks could represent both counterintelligence and influence operations.7 min read·Oct 23, 2020----
HorkosCYBERCOM Apparently Got Half-Baked Ideas for ChristmasCYBERCOM has ideas about how to deter Russian election interference in 2020 and they don’t inspire my confidence.9 min read·Dec 26, 2019----