Most weeks, it is far outside the normal job responsibilities for cybersecurity professionals to understand what the United States (or other governments) do to find or use computer vulnerabilities. Just stay patched and keep the board of directors happy. This is not one of those weeks.
This week we learned that the National Security Agency disclosed to Microsoft that it had discovered a major vulnerability (dubbed CVE-2020-0601) in Windows 10. A Washington Post article, by veteran cyber journalist Ellen Nakashima, declared this to be a “a major shift in the NSA’s approach, choosing to put computer security ahead of building up its arsenal of hacking tools that allow the agency to spy on adversaries’ networks.”
Want more insight? Log in for the full report This content is restricted to OODA Network members only. Members get access to all site content plus access to exclusive reports and events. Please consider becoming a member. For more information please click here. Thanks! Already a member? Sign in to your
The Olympic Games remain one of the most-watched events in the world, with billions tuning in across digital platforms and traditional broadcasting channels. Its high-profile nature makes it a target for malicious activity, but with the games’ increased digitization and with nation-state propaganda motives at play, cyberattacks are on the rise. As we approach the 2020 Tokyo Summer Games, it is essential to understand the risks and likely actors that will attempt to jeopardize the security and integrity of the upcoming Olympics.
On January 3, 2020, Iran’s Qassem Suleimani, head of the Islamic Revolutionary Guard Corps Quds Force (IRCG-QF) was killed by a US drone strike. Iran’s Supreme Leader Ali Khamenei declared that “harsh revenge” awaits those who led the strike against Suleimani. The military advisor to Khamenei stated that Iran’s response would “for sure be military” and directed against US military sites. It is hard to tell what the full nature of Iran’s response will be, history has shown they have an ability to surprise. However, we assess the most likely response will be state sponsored destructive cyber attacks done in a way that implies they were launched by Iran but still offer some level of ambiguity over source. We also assess increased attacks by hacktivist supporters of Iran.
The top stories on OODA Loop provide good insight into what issues will be top of mind for executives and experts going into 2020. Here are the 20 most popular posts of the year.
What does it take to be a highly effective CISO? Over the past 25 years, I’ve consulted for hundreds of executives on cybersecurity issues including direct support to dozens of CISOs working to effectively manage cyber risk in a wide variety of organizations. With this post, I’ve attempted to capture some of the best practices from the most effective CISOs I know. In future articles, we’ll look at each of the 10 habits in greater detail, including direct input from the CISO community.
With all major US carriers launching 5G cellular initiatives business leaders should now consider how this new technology can impact both current and future business operations. This guide provides succinct inputs that can kickstart your strategic planning to ensure you are ready to dominate during and after this strategic shift.
In this interview with Dan Dunkel, he describes where he sees tremendous opportunity in the convergence of physical security, IT platforms and cybersecurity. He connects the expertise in these three important disciplines though his network of over 200 integrators at Professional Security Alliance (PSA).
“I always encourage people to ‘Disrupt Yourself’. It’s painful and doesn’t feel good, but that’s how you start thinking about the future of your business, so you won’t get caught in the cross hairs of a new technology.”
Rick “Ozzie” Nelson shares how he has tracked counterterrorism, information security and information sharing to come up with great insights on how to align public strategies to be successful.
“If you can’t define it, you can’t understand it”. Ozzie says. “Today, everyone uses AI to mean many different things. We can’t write policies and make good laws and business decisions until we come to a common understanding of what it is!”.
Wi-Fi is as ubiquitous as a technology can get. It is widely used and widely understood. In part because of its widespread acceptance, the standards that make Wi-Fi work are slow to change. But a new change is coming and it will make dramatic improvements to how our devices communicate with each other. This post provides some insights into the new Wi-Fi standard aimed at the business and government executive. We review some of the opportunities and risks that will soon present themselves because of the new version, and will do so in a way that will help leaders consider how this change will impact your strategy for success in the market.