Cybersec’s Messy Messaging

I saw an article on The Register today entitled, Crypto for cryptographers! Infosec types revolt against use of ancient abbreviation by Bitcoin and NFT devotees.

TL;DR the argument is whether or not crypto should mean cryptography or cryptocurrency.

Now, I get it, it can be an emotional topic for some – but really? The majority of the population don’t even understand what cryptography actually is. You have governments trying to ban end to end encryption (refer to Alec Muffet for more nuanced discussions on E2E encryption), no-one ever seems to have got PGP working, and what does cryptography has to do with privacy or secure banking?

To me, that is the fundamental issue – the world is on fire, and we have the people who are probably best suited to not just explain what cryptography is, but implement it and validate it’s being used properly – arguing over whether we should call it crypto for short.

It seems to be a common theme in cyber security, or should I say information security? Maybe you prefer the term IT security because cyber meant something else to you in the mid-90’s?

I’m not trying to be difficult (that just comes natural to me). But sometimes I do think people spend too much time on the messaging, and not enough time on the intent of the message itself.

*** This is a Security Bloggers Network syndicated blog from Javvad Malik authored by j4vv4d. Read the original post at: https://javvadmalik.com/2021/11/23/cybersecs-messy-messaging/

Tags: Blog

Recent Posts

Vulnerabilities for AI and ML Applications are Skyrocketing

In their haste to deploy LLM tools, organizations may overlook crucial security practices. The rise in threats like Remote Code…

3 hours ago

Cheap ‘Junk-Gun Ransomware’ Emerging on the Dark Web

While inexpensive and crudely built, the ransomware variants still post a threat to smaller companies and individuals, Sophos says.

4 hours ago

What Makes Containers Vulnerable?

Read this quick guide to the types of vulnerabilities that affect containers. The post What Makes Containers Vulnerable? appeared first…

5 hours ago

USENIX Security ’23 – NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers

Authors/Presenters: *Yehuda Afek and Anat Bremler-Barr, Shani Stajnrod* Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s…

5 hours ago

DevOps pioneers navigate organizational transformation

The latest webinar in Sonatype's DevOps Download series, presented in partnership with The New Stack, offered an in-depth exploration into…

6 hours ago

To Breach or Not to Breach

The rapid adoption of could computing was yesterday’s news 5 years ago. Today’s news is that one of the most…

7 hours ago