16 Aug 2019

The Global Ungoverned Area

There are places on this planet where good, civilized people simply do not voluntarily go, or willingly stay. What elected governments do in safer and more developed parts of the world are carried out in these areas by despots and militias, often at terrible cost to those who have nowhere else to go and no means to go if they did.

Read More
16 Aug 2019

What You Really Need To Know About the California Consumer Privacy Act (CCPA)

There is something you really need to know about the State of California. They have optimized around a key function that they do very very well. They know how to collect money from corporations. They know how to collect taxes, and know how to levy large fines and collect on them. The business that owes California money will pay, and the State will likely do everything in their power to make sure they pay as much as the law allows. Keep this in mind as you read our guidance on the CCPA.

Read More
16 Aug 2019

Def Con is the Most Valuable Security Conference of the Year.  Here’s Why.

There are literally hundreds of cybersecurity conferences hosted around the world each year and as a result it can be difficult to determine which conferences provided the highest value in the domain. 

While each of these events bring community value in their own unique way, Def Con is the most valuable event of the year for the community. Here’s why.

Read More
15 Aug 2019

Cyber Threat Analysis Report Vol 1, Edition 9

OODA’s Cyber Threat Analysis Report provides the “so what” behind the news and events we track on a daily basis. When it comes to putting cyber news in context, there really is no substitute for experience. The context in this report is provided by one of the most highly regarded

Read More
09 Aug 2019

Startup Tech CEO: How do you form a federal channel partner strategy?

This is the next in our series of special reports for OODA members focused on federal business strategies for the Startup CEO (find them all here).

This special report focuses on channel partner strategies for high tech firms.

Read More
09 Aug 2019

The Wolf is Here: Cyber threats that have been long predicted are coming true on a daily basis

For decades we’ve heard that iCalamity is right around the corner. For decades we’ve largely ignored pleas to try and address computer security issues when they are relatively cheap and easy, before they got too large and complicated to do at all. We have been living a fairy tale life, and absent bold action and an emphasis on resiliency, it only gets grim(m)er going forward.

Read More
06 Aug 2019

Your Strategy For This Stage Of The U.S.-China Trade War

What should your business do in response to the current situation between the U.S. and China? The short answer is to stay agile! We provide tips on what do do in this special report.

Although trade tensions with China have been brewing for decades, the U.S. began accelerating actions in response in early 2017 and began announcing tariffs in July 2018. Since then there have been multiple rounds of trade negotiation and actions on both sides designed to influence the other to a successful outcome. The most recent action has been an early August announcement by President Trump that a 10% tariff would be placed on an additional $300 Billion worth of products imported from China since China continues to break promises made in negotiations. The new tariffs will go into effect September 1, 2019. This is on top of the already levied 25% tariffs on $250 billion in Chinese imports.

Read More
02 Aug 2019

Good Cybersecurity is Not Glamorous

One of the more common reasons why most organizations push back on spending for cyber security is the lack of a “return on investment.” All that fancy, shiny cyber-y stuff costs a lot of money without providing a clear benefit that is commensurate with the expenditure. Firewalls are expensive. IDS/IPS are expensive. SIEMs are expensive. Talent to run it all (if you can even find it) is expensive.

Read More
01 Aug 2019

Cyber Threat Analysis Report Vol 1, Edition 8

We are all targets!   This story and many more in the analysis by Mike Tanji in this week’s Cyber Threat Analysis Report.

Read More
01 Aug 2019

OODA Network Interview: Jeremy King

This post is based on an interview with Jeremy King. It is part of our series of interviews of OODA Network members. Our objective with these interviews is to provide actionable information of interest to the community, including insights that can help with your own career progression. We also really like highlighting some of the great people that make our continued research and reporting possible.

Read More