Leverage these open source tools to provide your organization with the best in class information to inform business strategy, operations, and risk awareness levels around the world. Firms that understand the strengths and weaknesses of ...
Analysis
Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) device vulnerabilities are, arguably, the threat surfaces that are of the utmost concern to cyber and homeland security professionals. If ICS/SCADA devices are mission-critical ...
Analysis
Based on the insights garnered from our November 2021 Stratigame on the Global Computer Chip Supply Chain Disruption, the following are some of the recent developments up and down the global semiconductor manufacturing supply chain ...
Analysis
In 2019, the Defense Intelligence Agency (DIA) published the first Challenges to Security in Space "to address the main threats to the array of U.S. space capabilities, and examine space and counterspace strategies and systems ...
Analysis
Like our broad research and analysis efforts last year regarding dis- misinformation and cognitive infrastructure, this year we embark on what academia calls a "literature review" on the topic of crypto and blockchain security initiatives ...
Analysis
John Smail, CISSP, a Senior Cyber Officer, United States Space Force (who previously held the position of Director, Cyberspace Operations & Deputy Director of Communications at the National Reconnaissance Office) recently announced that The Space ...
Analysis
Leverage these open source tools to provide your organization with the best in class information to inform business strategy, operations, and risk awareness levels around the world. Firms that understand the strengths and weaknesses ...
Analysis
The inaugural meeting of the CISA Cybersecurity Advisory Committee (CSAC) was held in December 2021. The second meeting of the committee was recently held in March. We provide here a brief recap ...
Analysis
Earlier this week, The State Department on Monday launched a new cybersecurity bureau, designed to enhance digital diplomacy and online standards around the world.
Analysis
In this - the largest refugee crisis since World War II - innovation and applied technologies will once again have to be solution-based and rapidly deployed. After all: radar, cryptography, logistics, and nuclear physics all ...
Analysis