17 Sep 2018

Software Ate The World: Now it is both a corporate and national security threat

With every sector of the economy, every element of critical infrastructure and every component of government now dependent on IT and software, clearly software has eaten the world.

Read More
17 Sep 2018

The FBI studied the pre-attack behaviors of 63 Active Shooters. This is what they found.

By articulating the concrete, observable pre-attack behaviors of many active shooters, the FBI hopes to make these warning signs more visible and easily identifiable.

Read More
05 Sep 2018

How Strong Leadership Propels Winning Companies

10 lessons from one headhunter’s two decades behind the scenes working with hundreds of clients and thousands of senior executives.

Read More
24 Aug 2018

Defense Science Board Task Force On Improving Cyber As A Strategic Weapon

The United States is currently years behind its rivals in cyberspace, both conceptually and operationally.

Read More
03 Aug 2018

Enhancing the Effectiveness of International Criminal Justice

Domain experts have called into question the effectiveness of the International Criminal Court.

Read More
04 Jul 2018

Embracing a Future of Technical and Political Churn

Two things happened last week that will ultimately have a huge impact on almost every American consumer alive today.

Read More
29 Jun 2018

Technological entanglement

An interesting paper from the Australian Strategic Policy Institute looking at issues of entanglement and dual-use technologies.

Read More
26 Jun 2018

DHS Warns Russia Can Take Down US Infrastructure

The Russian government likely has the ability to engage in disruptive and destructive attacks against U.S. critical infrastructure.

Read More
07 Jun 2018

10 Rules For Cybersecurity Salespeople

The cybersecurity market is so congested, it can be difficult to establish a dialogue with overwhelmed CISOs.

Read More
07 Jun 2018

Information – The Final Frontier of Cybersecurity

Cyber trust is not just about securing information technology systems. You must also secure business processes.

Read More