Every bit of research begins with an idea. I wonder if… Is it possible that… Could we maybe… These are sentences I’ve started when doing my...
Continue reading...Sampling Bias
The amount of data in Cybersecurity research is sometimes overwhelming. To get around this amount of data, we sample. That means we choose a subset of...
Continue reading...Moving From Research to Practice
Moving research in the area of cybersecurity into practice often is difficult for many reasons. I decided to look at another field which has similar issues,...
Continue reading...Special Issue on Cyber Risk and Insurance
We’re proud to announce a special issue on Cyber Risk and Insurance with editors Firasat Khan from the Metropolitan State University, Minnesota and Tirthankar Ghosh from...
Continue reading...The Benefit of Hindsight
Twenty years ago, the Melissa Virus was big news. It was the first mass mailing virus that spread itself from systems that used Word and Outlook...
Continue reading...Double Blind
I’m often asked why DTRAP is using a double blind system for reviews. The answer: We want to limit the amount of bias in the system....
Continue reading...The Principle of Containment
If a human virus researcher decided to test a new virus they’ve created by just releasing it to the world and seeing what happens, then that’s...
Continue reading...Jumping to Conclusions Without a Parachute
This study discusses whether or not it’s more useful to wear a parachute when jumping out of an airplane. It comes to the surprising conclusion that...
Continue reading...Don’t forget to tell me everything…
I’m going to digress for a moment into Chemistry because I think it makes my point clearer. Imagine you’re doing a litmus test on water with...
Continue reading...Future Malware Directions
Malware is often environmentally sensitive. It doesn’t want to run in a sandbox, it wants full access to the Internet. Researchers use a sandbox so they...
Continue reading...