It is a truism that every society is only a few meals away from revolution, proven not for the first time when high food prices initiated the Arab Spring, and yet food security is a woefully neglected national security concern. America lacks a national food policy, even though we are headed towards a crisis.
The black hat hiding in the closet and other analysis by Mike Tanji in this week’s Cyber Threat Analysis Report.
OODA has released the next report in our threat briefing series, this on focused on the country of Iran. This special report captures insights into the capabilities and intent of the Islamic Republic of Iran, with a special focus on the cyber domain. Our objective: provide insights that are actionable
Unmasking Maskirovka: Russia’s Cyber Influence Operations examines Russian ‘Information Operations’ (InfoOps) as a tool of strategic influence. This exploration is timely and relevant given the Russian assault on the American electoral process in the 2016 Presidential election—especially since the long-range implications are still being assessed.
OODA has released the next report in our threat briefing series, this on focused on the country of North Korea.
In a Joint Intelligence Bulletin issued by the U.S. Department of Homeland Security and Federal Bureau of Investigation the threat of terrorist attacks against faith-based communities and soft targets amid religious holidays is discussed.
Why is it so hard for us to pay attention to cybersecurity? Mike Tanji analyzes the latest news and trends in the cybersecurity industry.
This report provides detailed guidance for global executives and their security teams on how to protect their information and technology systems while traveling abroad.
With ATM hacking and credit card skimming becoming more easily prevented and detected, some criminals are resorting to the use of explosive breaches to target ATM machines.
NIST’s Ron Ross on the state of cyber: ’We literally are hemorrhaging critical information’ After Chinese hackers infiltrated a Navy subcontractor’s computer network and stole a trove of highly sensitive data on submarine warfare, it spurred the government to revise the standards that contractors must follow to ensure government data