Infrastructure
Critical systems including transportation, utilities, data centers, cybersecurity, and the challenges of maintaining and modernizing essential networks.
6 labs in this category
May 2026
-
22 May
Persistent Access Over Immediate Damage
Sophisticated attackers prioritize staying inside a target system undetected over causing immediate visible harm—long-term invisible control lets them choose when to disrupt, gather intelligence continuously, and complicate defensive response.
From: Estonian Prime Minister Michal: We are facing increasing cyberattacks from Russia - CNN
-
21 May
Continuity Through Handoff
Systems that last for centuries survive by embedding routine actions into daily infrastructure and passing both the action and its meaning to the next generation—when either the protocol or the motivation breaks, the chain ends.
From: Temple housing ‘eternal flame’ burns down in Japan - NBC News
-
20 May
Distributed Ownership and Invisible Handoffs
When multiple owners maintain pieces of one shared surface, safety depends on handoff clarity at boundaries—unclear responsibility for the seam between two systems creates gaps where neither party checks.
From: What went wrong? Woman identified in NYC manhole deadly plunge - NBC New York
-
18 May
Redundancy and Single-Point Failure
A system has redundancy when multiple paths can handle the same load, and has a single point of failure when losing one component stops the whole thing from working—the difference determines whether partial breakage degrades gracefully or collapses completely.
From: New York commuters face rush-hour chaos in first major rail strike in 30 years
-
12 May
Attack Surface Asymmetry
Defenders must secure every entry point in a system; attackers need to find just one weakness—the imbalance in required coverage creates structural advantage for offense over defense.
-
01 May
Nested Boundaries and Blast Radius
When boundaries nest inside each other, a breach at an inner layer compromises everything outside it, while a breach at an outer layer stays contained to that layer alone.
From: The most severe Linux threat to surface in years catches the world flat-footed