Email – The Often Overlooked Cybersecurity Risk
Are silly email mistakes putting your sensitive data and customer PII at risk or in violation of GDPR. Matt Devost breaks down four real life examples that highlight inadvertent email risks.
Start your day with intelligence. Get The OODA Daily Pulse.
Are silly email mistakes putting your sensitive data and customer PII at risk or in violation of GDPR. Matt Devost breaks down four real life examples that highlight inadvertent email risks.
OODA Network Members are invited to participate in our webinar on the Russian Threat scheduled for Tuesday February 19, 2019 at 2:00 p.m. EST.
The United States intelligence strategy for 2019 has been released, covering seven specific themes. Here's how the United States Intelligence Community will deal with cyber threats: "Despite growing awareness of cyber threats and improving cyber defenses, ...
How can you use HACKthinking to solve complex problems or evolve or develop a disruptive solution.
The top ten books of the year as curated by OODA Loop founder Matt Devost.
While hosting a delegation from France, Putin advised that to prevent cyber attacks, nations will have to establish international norms prohibiting such behavior. “This is what I can say about cyberattacks or war of words in ...
What cyber threat do China, Russia, and Iran present for the remainder of 2018 and 2019? Matt Devost provides some insight into the geopolitical elements influencing that answer.
Dr. Clifford Stoll, astronomer, professor, IT security pioneer and author of "The Cuckoo's Egg," discusses his ground-breaking work in IT security while at Berkeley, where he stumbled on an intrusion by hackers working on behalf ...
This article demonstrates how social media is a tool for modern information-age warfare. It builds on analysis of three distinct topics: social networking, propaganda, and news and information sharing. Two case studies are used to ...
Think all these news stories you are reading about cybersecurity, cyberwar, and cyberconflict are breaking new ground? It is worth taking a read through the several hundred entries meticulously compiled in Mich Kabay's 1999 Infosec Year ...