Foreign bad actors are conducting a covert cyber war. The pace, frequency, and intensity of cyberattacks are now greater than ever. As the physical realm inevitably merges with the cyber one, forming …
OODA Network Interview: Chitra Sivanandam
This post is based on an interview with Chitra Sivanandam, VP of Analytics and Simulation at SAIC. It is part of our series of interviews of OODA Network members. Our objective with these interviews …
Continue Reading about OODA Network Interview: Chitra Sivanandam
Is Organized Crime Using Ransomware to Take Real World Competitors Offline?
What does the ransomware incidents at GWK Travelex and Gedia Automotive tell us about the evolution of ransomware trends, and the players behind the attacks? Viewed from their individual incident …
Continue Reading about Is Organized Crime Using Ransomware to Take Real World Competitors Offline?
Flaws in the U.S. Vulnerabilities Equities Process
Last week, the security community was in a flurry around the disclosure of a severe vulnerability (known as CVE-2020-0601) in Microsoft’s Windows operating system. Notably, it was because the National …
Continue Reading about Flaws in the U.S. Vulnerabilities Equities Process
Vulnerabilities, the Search for Buried Treasure, and the US Government
This OODA Network Member Only content has been unlocked for unrestricted viewing by The Future Proof Conference through the OODA Unlocked program which lets community members promote thought …
Continue Reading about Vulnerabilities, the Search for Buried Treasure, and the US Government
OODA Special Report: Digital Transformation in the Financial Sector
This OODA special report focuses on the Financial Sector. It is written both for firms that are in the sector who are seeking competitive advantage and for firms in other sectors that can use this …
Continue Reading about OODA Special Report: Digital Transformation in the Financial Sector
OODA Network Interview: Stu Sjouwerman
This post is based on an interview with Stu Sjouwerman. It is part of our series of interviews of OODA Network members. Our objective with these interviews is to provide actionable information of …
Continue Reading about OODA Network Interview: Stu Sjouwerman
Cyber Threat Analysis Report Volume 1 Edition 5
Why is it so hard for us to pay attention to cybersecurity? With a daily deluge of cyberattacks, hacking incidents, data breaches and malware campaigns, it appears that – finally – many organisations …
Continue Reading about Cyber Threat Analysis Report Volume 1 Edition 5
The Cyber Threat Analysis Report Volume 1 Edition 2
Cybersecurity Jobs Remain Unfilled Because of Lack of Professionals Cyber theft is called the fastest-growing crime in the United States costing the global economy hundreds of billions of dollars …
Continue Reading about The Cyber Threat Analysis Report Volume 1 Edition 2
In 2017, Agencies Should Expect Forced Cyber Disruption
"In response to the OPM data breach, the House Oversight and Government Reform Committee investigated, reaching out to private-sector chief information officers to get cybersecurity recommendations to …
Continue Reading about In 2017, Agencies Should Expect Forced Cyber Disruption