A good strategy has three major components: a description of the goals you are trying to achieve, an explanation of how you are going to achieve those goals, and what things look like when your ...
Analysis
The United States said on Wednesday that it had secretly removed malware from computer networks around the world in recent weeks, a step to pre-empt Russian cyberattacks and send a message to President Vladimir V. ...
Analysis
The conflict in Ukraine has validated a number of assumptions cyberspace strategy and intelligence thinkers have been promulgating for over 20 years. The use of cyber attacks in conjunction with the traditional components of armed ...
Analysis
Management guru Peter Drucker said, “what gets measured gets managed.” Which helps to explain why Cybersecurity Awareness Month is such a bad idea.
Analysis
They’re not cybersecurity experts, but they did stay at a Holiday Inn Express last night.
Because we have no common body of knowledge from which to explore and learn from prior art, you can predict like ...
Analysis
The scourge of ransomware is the inevitable result of decades of schizophrenia about our relationship with information technology and security. Treating this problem in the same fashion as we have those that came before it ...
Analysis
The well-worn martial cliché says that no matter how elegant your plans, it is important to remember that the enemy gets a vote in how successful they are. The transition of military and intelligence activities ...
Analysis
While the Ware Report of 1970 codified the foundations of the computer security discipline, it was the President’s Commission on Critical Infrastructure Protection report of 1997 that expanded those requirements into recommendations for both discrete ...
Analysis
Noted cybersecurity expert Mike Tanji provides context on what to expect from the cybersecurity actions and policies of the Biden Administration. His insights are based on thirty years in the field. He cautions us all ...
Analysis
OODA’s Cyber Threat Analysis Report provides the “so what” behind the news and events we track on a daily basis. When it comes to putting cyber news in context, there really is no substitute for ...
Analysis