This is the second article in a four-part series focused on proactively managing corporate security culture and workforce expectations as your organization prepares to prevent, detect, and respond to insider risk incidents.
An award-winning former Federal CIO shares secrets for running a successful technology program.
An OODA Loop interview with author P.W. Singer on his new book about information operations on social networks.
Congressman Will Hurd talks with OODA Loop about Artificial Intelligence policy and his newly released committee report calling for a national AI strategy.
The United States government has released a set of common definitions for talking about election cybersecurity issues.
What your organization should be doing to proactively managing corporate security culture and workforce expectations as it prepares to prevent, detect, and respond to insider risk incidents.
Software and our internetworked computer systems are more complex than ever. Which means to develop countermeasures to these new types of cyberattacks we have to work harder than ever.
With every sector of the economy, every element of critical infrastructure and every component of government now dependent on IT and software, clearly software has eaten the world.
By articulating the concrete, observable pre-attack behaviors of many active shooters, the FBI hopes to make these warning signs more visible and easily identifiable.
10 lessons from one headhunter’s two decades behind the scenes working with hundreds of clients and thousands of senior executives.