27 Jan 2020

Mexican Cartel Adaptation and Innovation

Adaptation and innovation is a core component of successful organization competition among states and their militaries, businesses and corporations—and as argued here, organized crime groups—especially transnational criminal organizations (TCOs).  In order to gain supremacy organizations often introduce new technologies to foster this innovation, yet not all innovation is technological.  Indeed, non-state actors are often incubators of novel practices and non-technological innovation to further their goals and often to survive.  This brief assessment looks at non-technological innovation potentials among Mexican TCOs (criminal cartels and gangs).

Read More
24 Jan 2020

Flaws in the U.S. Vulnerabilities Equities Process

Last week, the security community was in a flurry around the disclosure of a severe vulnerability (known as CVE-2020-0601) in Microsoft’s Windows operating system. Notably, it was because the National Security Agency (NSA) tipped off Microsoft, helping the tech giant patch the flaw instead of exploiting it for national security missions. NSA was praised for its cultural shift from offense to defense, however, in my opinion, not all that glitters is gold.

Read More
24 Jan 2020

OODA Network Interview: Nitin Pradhan

When Nitin came to America in the 1980’s, he quickly felt the power of a supportive Government.  He has spent his career using technology to create teams to make our Country better including an appointment as the CIO for the Department of Transportation.  Read about how Nitin’s passion for digital education has helped him give back to his Community.

Read More
17 Jan 2020

OODA Special Report: Digital Transformation in the Health Care Sector

Want more insight? Log in for the full report This content is restricted to OODA Network members only. Members get access to all site content plus access to exclusive reports and events. Please consider becoming a member. For more information please click here. Thanks! Already a member?  Sign in to your

Read More
14 Jan 2020

Vulnerabilities, the Search for Buried Treasure, and the US Government

Most weeks, it is far outside the normal job responsibilities for cybersecurity professionals to understand what the United States (or other governments) do to find or use computer vulnerabilities. Just stay patched and keep the board of directors happy. This is not one of those weeks.

This week we learned that the National Security Agency disclosed to Microsoft that it had discovered a major vulnerability (dubbed CVE-2020-0601) in Windows 10. A Washington Post article, by veteran cyber journalist Ellen Nakashima, declared this to be a “a major shift in the NSA’s approach, choosing to put computer security ahead of building up its arsenal of hacking tools that allow the agency to spy on adversaries’ networks.”

Read More
10 Jan 2020

OODA Special Report: Digital Transformation in the Financial Sector

Want more insight? Log in for the full report This content is restricted to OODA Network members only. Members get access to all site content plus access to exclusive reports and events. Please consider becoming a member. For more information please click here. Thanks! Already a member?  Sign in to your

Read More
09 Jan 2020

Cyber Threats to the 2020 Tokyo Summer Olympics

The Olympic Games remain one of the most-watched events in the world, with billions tuning in across digital platforms and traditional broadcasting channels. Its high-profile nature makes it a target for malicious activity, but with the games’ increased digitization and with nation-state propaganda motives at play, cyberattacks are on the rise. As we approach the 2020 Tokyo Summer Games, it is essential to understand the risks and likely actors that will attempt to jeopardize the security and integrity of the upcoming Olympics.

Read More
07 Jan 2020

OODA Special Report: What You Need To Know About Iranian Cyber War Capabilities and Intentions

On January 3, 2020, Iran’s Qassem Suleimani, head of the Islamic Revolutionary Guard Corps Quds Force (IRCG-QF) was killed by a US drone strike. Iran’s Supreme Leader Ali Khamenei declared that “harsh revenge” awaits those who led the strike against Suleimani. The military advisor to Khamenei stated that Iran’s response would “for sure be military” and directed against US military sites. It is hard to tell what the full nature of Iran’s response will be, history has shown they have an ability to surprise. However, we assess the most likely response will be state sponsored destructive cyber attacks done in a way that implies they were launched by Iran but still offer some level of ambiguity over source. We also assess increased attacks by hacktivist supporters of Iran. 

Read More
26 Dec 2019

Towards 2020 – The Most Popular Stories on OODA Loop for 2019

The top stories on OODA Loop provide good insight into what issues will be top of mind for executives and experts going into 2020.  Here are the 20 most popular posts of the year.

Read More
18 Dec 2019

11 Habits of Highly Effective CISOs

What does it take to be a highly effective CISO? Over the past 25 years, I’ve consulted for hundreds of executives on cybersecurity issues including direct support to dozens of CISOs working to effectively manage cyber risk in a wide variety of organizations.  With this post, I’ve attempted to capture some of the best practices from the most effective CISOs I know. In future articles, we’ll look at each of the 10 habits in greater detail, including direct input from the CISO community. 

Read More