The Department of Defense is establishing a new approach they expect their contractors, and sub-contractors to leverage. This is meant to help reduce risk and mitigate many challenges observed in implementing existing security/compliance regulations in ...
Analysis
NASA is enabling another giant leap for humanity. With the Artemis program, humans will return to the Moon in a way that will enable establishment of gateways to further exploration of not just the Moon ...
Analysis
My background is in operational intelligence. I started my career as a naval intelligence officer working the dynamic problems of operational fleets in real-world, ours-vs-theirs situations. I later worked joint and allied military intelligence, but ...
Analysis
OODA Experts provide their perspective on the RSA 2019 conference including a list of 30+ companies to watch.
Analysis
An OODA Loop interview with author P.W. Singer on his new book about information operations on social networks.
Analysis
With every sector of the economy, every element of critical infrastructure and every component of government now dependent on IT and software, clearly software has eaten the world.
Analysis
The United States is currently years behind its rivals in cyberspace, both conceptually and operationally.
Analysis
Lessons learned from US agents who operate in enemy territory have been captured for years and transformed into a code of conduct popularly known as "Moscow Rules." Those old rules existed for a reason. Real-world ...
Analysis
Federal Cyber Security professionals have long considered the “insider threat” as the most insidious, hardest to protect against threat vector. This has always been the toughest form of threat, even before computers were created. Now ...
Analysis
"The Federal Bureau of Investigation's top cyber cop offered a grim appraisal of the nation's efforts to keep computer hackers from plundering corporate data networks: "We're not winning," he said. "
(Source: U.S. Outgunned in Hacker ...
Analysis