Start your day with intelligence. Get The OODA Daily Pulse.

Emilio Iasiello

Emilio Iasiello has nearly 20 years’ experience as a strategic cyber intelligence analyst, supporting US government civilian and military intelligence organizations, as well as the private sector. He has delivered cyber threat presentations to domestic and international audiences and has published extensively in such peer-reviewed journals as Parameters, Journal of Strategic Security, the Georgetown Journal of International Affairs, and the Cyber Defense Review, among others. All comments and opinions expressed are solely his own.

Cyber Matters Draw Israel and Saudi Arabia Closer Together

Recent reporting indicates that the Kingdom of Saudi Arabia has been investing substantially in Israeli cyber companies that produce offensive cyber tools and weapons.  Per these findings, its presumed that the use of such technology ...

Analysis

Do Cybersecurity Bilateral Agreements Do Anything?

There is so much about these cybersecurity bilateral agreements that are not known, as few of the agreements have been fully made public with most known about them coming from public statements. At best, coverage ...

Analysis

Would a Splinternet Be That Bad?

The term “splinternet” refers to the increasingly balkanization of the Internet, where the cyber domain is dividing due to a variety of reasons to include but not limited to technology, commerce, nationalism, politics, among others.  ...

Analysis

North Korea Tries Ransomware… Again

The Department of Homeland Security recently published a joint advisory along with the Federal Bureau of Investigation (FBI) and the Department of Treasury on suspected North Korean state-sponsored ransomware campaign implementing the Maui malware. The ...

Analysis

The Cyber Mercenary Business is Booming

A recent report revealed several private sector Indian companies that have been involved in using corporate cyber espionage tactics against entities involved in litigation in an effort to influence their outcomes. What started off as ...

Analysis

Time to Separate CYBERCOM Or Get Off the Pot

Recently, the U.S. Senate put forth a bill that would require annual briefings on the relationship between CYBERCOM and the NSA, with concerns being expressed how a dual-hatted leadership impacts either organization.  These annual reports ...

Analysis

Is There Too Much Focus on Disinformation?

Recently, the United Nations (UN) Security Council stated that there needed to be more done to counter misinformation and disinformation concerning the UN’s 12 global peacekeeping operations, which have received an increase of attacks on ...

Analysis

Can We Rethink Critical Infrastructure Cybersecurity?

Protecting critical infrastructure is an imperative for any government grappling to integrate resilient cybersecurity measures into the assets, systems, and networks that are vital for a nation’s national, economic, and public health and safety security.  ...

Analysis

Weaponizing Hacktivists Seems a Logical Progression for Russia

The Ukraine conflict has garnered substantial cyber activity drawing in not only the state cyber assets of both Russia and Ukraine, but sympathizers, volunteers, and non-state hacktivist actors supporting both sides. While much focus has ...

Analysis