<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[BinaryFirefly research | analysis | insights]]></title><description><![CDATA[research | analysis | insights from BinaryFirefly]]></description><link>https://research.binaryfirefly.com</link><image><url>https://substackcdn.com/image/fetch/$s_!rJCm!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9fcb0ff-9e1d-499d-9d2a-5f358fdb1415_1280x1280.png</url><title>BinaryFirefly research | analysis | insights</title><link>https://research.binaryfirefly.com</link></image><generator>Substack</generator><lastBuildDate>Tue, 21 Apr 2026 09:17:11 GMT</lastBuildDate><atom:link href="https://research.binaryfirefly.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[BinaryFirefly Ltd]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[binaryfirefly@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[binaryfirefly@substack.com]]></itunes:email><itunes:name><![CDATA[Ollie]]></itunes:name></itunes:owner><itunes:author><![CDATA[Ollie]]></itunes:author><googleplay:owner><![CDATA[binaryfirefly@substack.com]]></googleplay:owner><googleplay:email><![CDATA[binaryfirefly@substack.com]]></googleplay:email><googleplay:author><![CDATA[Ollie]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Paper: Digital Borders and Assets in National Cyber Resilience]]></title><description><![CDATA[A new think tank paper from BinaryFirefly]]></description><link>https://research.binaryfirefly.com/p/paper-digital-borders-and-assets</link><guid isPermaLink="false">https://research.binaryfirefly.com/p/paper-digital-borders-and-assets</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Wed, 15 Feb 2023 14:10:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qQmB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e87ea47-83b8-4554-9b22-6d0ea30f1956_615x798.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The inaugural paper from <a href="https://www.binaryfirefly.com/">BinaryFirefly</a> has been published titled <a href="https://static1.squarespace.com/static/6329f004e4e6f83c63c4f9b2/t/63ece14f2fc2ab5092a09d02/1676468561693/BinaryFirefly+-+Think+Tank+-+Digital+Borders+and+Assets+in+National+Cyber+Resilience.pdf">Digital Borders and Assets in National Cyber Resilience</a> for which the preface is:</p><p><em>Governments produce quantified comparators both with itself and others often periodically to show progress against stated policy objectives. We suggest that for Governments to be effective in their cyber resilience objectives they need to be able to define where their digital borders begin and end as well those digital assets which comprise their national asset register both in and out of country across Government, Academia and the Private Sector.</em></p><p><em>In the context of cyber risk, the assets that comprise a country can be seen as analogous to the assets that comprise an organisation. Being able to define and identify such assets is considered a fundamental requirement to cyber hygiene in contemporary governance. Similarly there have been calls and proposals for the US to have a Bureau of Cyber Statistics and the UK to have an Office of National Statistics of Cyber. We suggest for such organisations to be effective would similarly require definition and identification of assets.</em></p><p><em>This paper explores the considerations around how the digital borders and assets that comprise a country may be defined.</em></p><p>You can download by clicking the link above or the image below.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://static1.squarespace.com/static/6329f004e4e6f83c63c4f9b2/t/63ece14f2fc2ab5092a09d02/1676468561693/BinaryFirefly+-+Think+Tank+-+Digital+Borders+and+Assets+in+National+Cyber+Resilience.pdf" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qQmB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e87ea47-83b8-4554-9b22-6d0ea30f1956_615x798.png 424w, https://substackcdn.com/image/fetch/$s_!qQmB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e87ea47-83b8-4554-9b22-6d0ea30f1956_615x798.png 848w, https://substackcdn.com/image/fetch/$s_!qQmB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e87ea47-83b8-4554-9b22-6d0ea30f1956_615x798.png 1272w, https://substackcdn.com/image/fetch/$s_!qQmB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e87ea47-83b8-4554-9b22-6d0ea30f1956_615x798.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qQmB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e87ea47-83b8-4554-9b22-6d0ea30f1956_615x798.png" width="615" height="798" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1e87ea47-83b8-4554-9b22-6d0ea30f1956_615x798.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:798,&quot;width&quot;:615,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:284786,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://static1.squarespace.com/static/6329f004e4e6f83c63c4f9b2/t/63ece14f2fc2ab5092a09d02/1676468561693/BinaryFirefly+-+Think+Tank+-+Digital+Borders+and+Assets+in+National+Cyber+Resilience.pdf&quot;,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qQmB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e87ea47-83b8-4554-9b22-6d0ea30f1956_615x798.png 424w, https://substackcdn.com/image/fetch/$s_!qQmB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e87ea47-83b8-4554-9b22-6d0ea30f1956_615x798.png 848w, https://substackcdn.com/image/fetch/$s_!qQmB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e87ea47-83b8-4554-9b22-6d0ea30f1956_615x798.png 1272w, https://substackcdn.com/image/fetch/$s_!qQmB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1e87ea47-83b8-4554-9b22-6d0ea30f1956_615x798.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Welcome]]></title><description><![CDATA[BinaryFirefly research | analysis | insight]]></description><link>https://research.binaryfirefly.com/p/coming-soon</link><guid isPermaLink="false">https://research.binaryfirefly.com/p/coming-soon</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Thu, 12 Jan 2023 07:00:10 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c9fcb0ff-9e1d-499d-9d2a-5f358fdb1415_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the <a href="https://www.binaryfirefly.com/">BinaryFirefly</a> research | analysis | insights launching in 2023. </p><p>Subscribe now to receive in your inbox:</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://research.binaryfirefly.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://research.binaryfirefly.com/subscribe?"><span>Subscribe now</span></a></p><p>Whilst we launch you may enjoy our other weekly publication &#8216;<a href="https://bluepurple.binaryfirefly.com/">Blue Purple Pulse</a>&#8217;</p><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:443846,&quot;name&quot;:&quot;Cyber Defence News for Blue &amp; Purple Teams&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f99163ce-5bea-4b69-88df-e191823eba5d_1280x1280.png&quot;,&quot;base_url&quot;:&quot;https://bluepurple.substack.com&quot;,&quot;hero_text&quot;:&quot;Summarised cyber defence technical content to help operational blue and purple teams be informed and protect their estates.&quot;,&quot;author_name&quot;:&quot;Ollie&quot;,&quot;show_subscribe&quot;:true,&quot;logo_bg_color&quot;:null,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPublicationToDOMWithSubscribe"><div class="embedded-publication show-subscribe"><a class="embedded-publication-link-part" native="true" href="https://bluepurple.substack.com?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><img class="embedded-publication-logo" src="https://substackcdn.com/image/fetch/$s_!cDGH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff99163ce-5bea-4b69-88df-e191823eba5d_1280x1280.png" width="56" height="56"><span class="embedded-publication-name">Cyber Defence News for Blue &amp; Purple Teams</span><div class="embedded-publication-hero-text">Summarised cyber defence technical content to help operational blue and purple teams be informed and protect their estates.</div><div class="embedded-publication-author-name">By Ollie</div></a><form class="embedded-publication-subscribe" method="GET" action="https://bluepurple.substack.com/subscribe?"><input type="hidden" name="source" value="publication-embed"><input type="hidden" name="autoSubmit" value="true"><input type="email" class="email-input" name="email" placeholder="Type your email..."><input type="submit" class="button primary" value="Subscribe"></form></div></div>]]></content:encoded></item></channel></rss>