Start your day with intelligence. Get The OODA Daily Pulse.

Emilio Iasiello

Emilio Iasiello has nearly 20 years’ experience as a strategic cyber intelligence analyst, supporting US government civilian and military intelligence organizations, as well as the private sector. He has delivered cyber threat presentations to domestic and international audiences and has published extensively in such peer-reviewed journals as Parameters, Journal of Strategic Security, the Georgetown Journal of International Affairs, and the Cyber Defense Review, among others. All comments and opinions expressed are solely his own.

Time for the ONCD to Stand Alone at the Tip of the Cyber Pyramid

Recent reporting indicates that there is growing support among cyber policy professionals to elevate the role and authority of the Office of the National Cyber Director (ONCD), a position whose roles and responsibilities have come in conflict ...

Analysis

Opinion: What Will Cyber Look Like with Trump 2.0?

What cyber policies the new cyber team will implement remains a question, but there may be some indication of what will come to pass based on what was observed during Trump’s first term, and his ...

Analysis

The U.S. to Fall in Line with UN Cybercrime Treaty

The Biden Administration recently opted to back the UN Cybercrime Treaty despite criticism by technology and security firms that the treaty could be leveraged by some governments to ratchet up internal controlsin and criminalize legitimate security research.

Analysis

What Will the Next President Bring to the Cyber Game?

As the United States pushes closer to electing its next president, the nation faces many challenges that need to be addressed.  Whether it be hot button issues like illegal immigration, domestic economic concerns, or U.S. involvement ...

Analysis

SALT TYPHOON Exploits Backdoor to U.S. Wiretap System

Recently, Chinese advanced persistent threat activity dubbed “SALT TYPHOON” was linked to intrusions that accessed major U.S. broadband providers such as ATT&T and Verizon Communications, among others.  Per reporting, the threat actors appeared to have maintained access for ...

Analysis