In a series of posts entitled Autonomous Everything, we are exploring automation in all its technological forms, including legacy working assumptions about the term itself. Autonomous Everything includes a broad autonomous future in areas such as Security Automation, ...
Analysis
China has purposefully committed to competing in the advanced technology realm and views its dominance as integral to becoming a complete cyber power, and one that counterbalances the United States in what it views are ...
Analysis
Traditional threat detection (e.g., rule-based intrusion detection, anti-virus systems, and threat intelligence feeds) has been reactive and not a reliable way of preventing threats. While a database full of past events is better than an ...
Analysis
Additive manufacturing is an exponential technology that will disrupt many industry verticals, including the future of the commercial space industry. Many of the component parts used to build additive manufacturing systems are examples of the ...
Analysis
CISA usually puts out an official Shields Up! advisory on long U.S. holiday weekends (based on the historical pattern of increased cyber activities directed at the U.S. during those weekends).
Although this weekend was not a ...
Analysis
While the United States has traditionally leaned on public relations to promote its messaging via public diplomacy and overt public social media channels, this new activity is more surreptitious in nature. Per the data collected ...
Analysis
While massive, global cyber theft and data breaches may capture the headlines, there are many other issues surrounding the future of cryptocurrency. Fraud and cybersecurity activity is necessary for creative destruction in the cryptocurrency marketplace. ...
Analysis
In a series of posts entitled Autonomous Everything, we are exploring automation in all its technological forms, including legacy working assumptions about the term itself. Autonomy is not just about the future of the automobile and ...
Analysis
Last year, OODA Network Member Congressman Will Hurd was a Commissioner for the Aspen Institute's Information Disorder Report. Congressman Hurd will take part in a Keynote Conversation at OODAcon (which is the final event of the ...
Analysis
We now turn our focus to a recommendation made by the Council on Foreign Relations Independent Task Force on Cybersecurity calling for the international expansion of the Vulnerabilities Equities Process (VEP). Our ...
Analysis