One of the more common reasons why most organizations push back on spending for cyber security is the lack of a “return on investment.” All that fancy, shiny cyber-y stuff costs a lot of money without providing a clear benefit that is commensurate with the expenditure. Firewalls are expensive. IDS/IPS are expensive. SIEMs are expensive.…
This post is based on an interview with Jeremy King. It is part of our series of interviews of OODA Network members. Our objective with these interviews is to provide actionable information of interest to the community, including insights that can help with your own career progression. We also really like highlighting some of the…
Why are we perpetually surprised (or not, depending on how you look at it) at the failure of so many at both the organizational and individual level to take cybersecurity seriously? I would argue that most people are placing cybersecurity exactly where it should be when it comes to the myriad risks in their lives,…
This post is based on an interview with the highly regarded and proven cybersecurity professional Mike Tanji. It is part of our series of interviews of OODA Network members. Our objective with these interviews is to provide actionable information of interest to the community, including insights that can help with your own career progression. We…
In 1999 a book called “Unrestricted Warfare” emerged from China and over the past two decades it has served as a good guide for how China views conflict and in particular, cyber and economic conflicts. Businesses that understood Unrestricted Warfare were better enabled to defend their networks and market share. Twenty years later, the U.S.…
So much attention has been paid to “election hacking” and the like in recent years, analysts and commentators have effectively forgotten an equally if not more pressing threat to American government at all levels: ransomware. We cannot fix the reading comprehension problems and poor critical thinking skills of more than half the nation’s population, but…
This post is based on an interview with Bryson Bort. It is part of our series of interviews of OODA Network members. Our objective with these interviews is to provide actionable information of interest to the community, including insights that can help with your own career progression. We also really like highlighting some of the…
The proliferation of cyber physical systems (CPS) has increasingly enabled cyber actions to have direct kinetic effects on tangible infrastructure, even as cyberspace itself depends on tangible infrastructure vulnerable to kinetic damage. This report focuses on Russia, a particularly important threat actor to track given their track record of brazen infrastructure attacks. It is almost…
OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation. Dan is also the author of the recently released book entitled “The Story of Technology”.