Traditional threat detection (e.g., rule-based intrusion detection, anti-virus systems, and threat intelligence feeds) has been reactive and not a reliable way of preventing threats. While a database full of past events is better than an ...
Analysis
Additive manufacturing is an exponential technology that will disrupt many industry verticals, including the future of the commercial space industry. Many of the component parts used to build additive manufacturing systems are examples of the ...
Analysis
CISA usually puts out an official Shields Up! advisory on long U.S. holiday weekends (based on the historical pattern of increased cyber activities directed at the U.S. during those weekends).
Although this weekend was not a ...
Analysis
While the United States has traditionally leaned on public relations to promote its messaging via public diplomacy and overt public social media channels, this new activity is more surreptitious in nature. Per the data collected ...
Analysis
While massive, global cyber theft and data breaches may capture the headlines, there are many other issues surrounding the future of cryptocurrency. Fraud and cybersecurity activity is necessary for creative destruction in the cryptocurrency marketplace. ...
Analysis
In a series of posts entitled Autonomous Everything, we are exploring automation in all its technological forms, including legacy working assumptions about the term itself. Autonomy is not just about the future of the automobile and ...
Analysis
Last year, OODA Network Member Congressman Will Hurd was a Commissioner for the Aspen Institute's Information Disorder Report. Congressman Hurd will take part in a Keynote Conversation at OODAcon (which is the final event of the ...
Analysis
We now turn our focus to a recommendation made by the Council on Foreign Relations Independent Task Force on Cybersecurity calling for the international expansion of the Vulnerabilities Equities Process (VEP). Our ...
Analysis
In a series of posts entitled Autonomous Everything, we are exploring automation in all its technological forms, including legacy working assumptions about the term itself. We began the series in June with a description of ...
Analysis
The Cybersecurity and Infrastructure Security Agency's (CISA) continues to model an operational structure with an effective public/private partnership component that yields actionable results.
The latest success is the evolution of the CISA Cybersecurity Advisory Committee (CSAC ...
Analysis