10 Aug 2021

The False Pundits of Cyber Will Lead Us Astray If We Let Them

They’re not cybersecurity experts, but they did stay at a Holiday Inn Express last night. Because we have no common body of knowledge from which to explore and learn from prior art, you can predict like the seasons when another cohort of professionals from other disciplines will attempt to tell

Read More
01 Jun 2021

Ransomware: The Present we Deserve?

The scourge of ransomware is the inevitable result of decades of schizophrenia about our relationship with information technology and security. Treating this problem in the same fashion as we have those that came before it will only prolong our suffering. Clarity, creativity, and will are required if we are to have any hope of a future where ransomware is an annoyance and not a plague.

Read More
29 Mar 2021

This is How They Tell Me Cyber Peace is Achieved

The well-worn martial cliché says that no matter how elegant your plans, it is important to remember that the enemy gets a vote in how successful they are. The transition of military and intelligence activities to cyberspace didn’t change that, but it got more complicated because the traditional calculus rarely incorporated non-state actors and their ability to project power online (a monopoly held by states in meat-space, but possible by anyone in cyberspace). Should platforms decide to take a more active and prominent role in these issues, it won’t just mean that they too get a vote: they get a veto.

Read More
01 Mar 2021

From Solar Sunrise to Solar Winds: The Questionable Value of Two Decades of Cybersecurity Advice

While the Ware Report of 1970 codified the foundations of the computer security discipline, it was the President’s Commission on Critical Infrastructure Protection report of 1997 that expanded those requirements into recommendations for both discrete entities as well as the nascent communities that were growing in and around the Internet. Subsequent events that were the result of ignoring that advice in turn led to the creation of more reports, assessments, and studies that reiterate what was said before. If everyone agrees on what we should do, why do we seem incapable of doing it? Alternately, if we are doing what we have been told to do, and have not reduced the risks we face, are we asking people to do the wrong things? 

Read More
20 Jan 2021

Meet the New Boss: Context on Cybersecurity and US Federal Leadership

Noted cybersecurity expert Mike Tanji provides context on what to expect from the cybersecurity actions and policies of the Biden Administration. His insights are based on thirty years in the field. He cautions us all to maintain a level of hope, but to not get too worked up about transitions and talk of change. Everyone is all talk until they sit down in the chair and begin to understand exactly what it takes to govern. That said, there are changes that can be expected. Here are a few signals to watch for to see if they will stick.

Read More
26 Sep 2019

Cyber Threat Analysis Report Volume 1 Edition 11

OODA’s Cyber Threat Analysis Report provides the “so what” behind the news and events we track on a daily basis. When it comes to putting cyber news in context, there really is no substitute for experience. The context in this report is provided by one of the most highly regarded cybersecurity practitioners and pioneer of cyber threat intelligence (and OODA Network expert) Mike Tanji. In this edition, Mike brings context into the continual unrealistic hope that one day technology can replace wetware in cybersecurity, insights into breakability, what gets measured in our line of work, and much much more.

Read More
12 Sep 2019

Cyber Threat Analysis Report Vol 1, Edition 10

OODA’s Cyber Threat Analysis Report provides the “so what” behind the news and events we track on a daily basis. When it comes to putting cyber news in context, there really is no substitute for experience. The context in this report is provided by one of the most highly regarded cybersecurity practitioners and pioneer of cyber threat intelligence (and OODA Network expert) Mike Tanji. In this edition, Mike brings context into the ransomware attacks against cities, the changing situation regarding best practices in perimeter defense, stunt hacking and many other hot topics you will want to track.

Read More
30 Aug 2019

Cyber Threat Analysis Report Vol 1, Edition 9

OODA’s Cyber Threat Analysis Report provides the “so what” behind the news and events we track on a daily basis. When it comes to putting cyber news in context, there really is no substitute for experience. The context in this report is provided by one of the most highly regarded cybersecurity practitioners and pioneer of cyber threat intelligence (and OODA Network expert) Mike Tanji. In this edition, Mike brings context into the ransomware attacks against cities, the changing situation regarding best practices in perimeter defense, stunt hacking and many other hot topics you will want to track.

Read More
23 Aug 2019

The (Dis)illusion of Control: Context on the concept of increasing cost to adversaries

Conventional wisdom is telling us that “assumption of breach” is the new normal. Some well-respected names in computer security would have you believe that the appropriate response to such conditions is to increase the cost to the attackers. If you’re too expensive to breach – so the logic goes – the bad guys will go looking for someone else. Maybe someday, when everyone makes hacking too expensive, it will stop.

Read More
23 Aug 2019

Cyber War: The Fastest Way to Improve Cybersecurity

For all the benefits IT in general and the Internet specifically have given us, it has also introduced significant risks to our well-being and way of life. Yet cybersecurity is still not a priority for a majority of people and organizations. No amount of warnings about the risks associated with poor cybersecurity have helped drive significant change. Neither have real-world incidents that get worse and worse every year.

Read More