The President's Commission on Critical Infrastructure Protection is often cited as one of the most important initiatives from the 1990s that advanced our cybersecurity programs in the U.S. The commission, which looked at cyber threats ...
Analysis
Are silly email mistakes putting your sensitive data and customer PII at risk or in violation of GDPR. Matt Devost breaks down four real life examples that highlight inadvertent email risks.
Analysis
OODA Network Members are invited to participate in our webinar on the Russian Threat scheduled for Tuesday February 19, 2019 at 2:00 p.m. EST.
Analysis
The United States intelligence strategy for 2019 has been released, covering seven specific themes. Here's how the United States Intelligence Community will deal with cyber threats:
"Despite growing awareness of cyber threats and improving cyber defenses, ...
Analysis
How can you use HACKthinking to solve complex problems or evolve or develop a disruptive solution.
Analysis
The top ten books of the year as curated by OODA Loop founder Matt Devost.
Analysis
While hosting a delegation from France, Putin advised that to prevent cyber attacks, nations will have to establish international norms prohibiting such behavior.
“This is what I can say about cyberattacks or war of words in ...
Analysis
What cyber threat do China, Russia, and Iran present for the remainder of 2018 and 2019? Matt Devost provides some insight into the geopolitical elements influencing that answer.
Analysis
Dr. Clifford Stoll, astronomer, professor, IT security pioneer and author of "The Cuckoo's Egg," discusses his ground-breaking work in IT security while at Berkeley, where he stumbled on an intrusion by hackers working on behalf ...
Analysis
This article demonstrates how social media is a tool for modern information-age warfare. It builds on analysis of three distinct topics: social networking, propaganda, and news and information sharing. Two case studies are used to ...
Analysis