In a report released in 2020 and made possible by the OpenAI API Academic Access Program, The Middlebury Institute of International Studies - Center on Terrorism, Extremism, and Counterterrorism (CTEC) evaluated the revolutionary improvements of ...
Analysis
OODA hosts a monthly video call to help members optimize opportunities and reduce risk to discuss items of common interest to our membership. These highly collaborative sessions are always a great way for our members ...
Analysis
The United States hosted a group of 37 nations and 13 global companies to discuss the problem of ransomware, as well as other cybercrime. The meeting was a follow up to last year’s Counter-Ransomware Initiative ...
Analysis
The fourth meeting of the Cybersecurity and Infrastructure Security Agency (CISA) Cybersecurity Advisory Committee (CSAC) was held in September 2022. Opening remarks were addressed to the committee by Ms. Megan Tsuyi, ...
Analysis
Recent announcements by Razor’s Edge Ventures, America’s Frontier Fund, and the Quad Investor Network signal that the venture capital community is focusing its efforts on national security investment and American competitiveness - which has been ...
Analysis
In yet another example of a successful public/private policy research collaboration and in a continuation of the topic discussed by Brian Jenkins at the OODA Network November Monthly Meeting - domestic political extremism - we ...
Analysis
In July 2021, President Biden signed a National Security Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems. This memorandum required CISA, in coordination with the National Institute of Standards and Technology (NIST) and the interagency community, ...
Analysis
Historically, threat detection (e.g., rule-based intrusion detection, anti-virus systems, and threat intelligence feeds) has been reactive and involves flagging digital requests containing known signatures. These signatures are formalized post hoc, emanating from a compromise that ...
Analysis
As the 27th Conference of the Parties to the United Nations Framework Convention on Climate Change (COP27) meets in Sharm el-Sheikh, Egypt, we dedicate this installment of the Speculative Design Series to the future of ...
Analysis
The InterPlanetary File System (IPFS) is an emerging Web3 technology that is currently seeing widespread abuse by threat actors. Cisco Talos has observed multiple ongoing campaigns that leverage the IPFS network to host their ...
Analysis