06 Jul 2021

Japan Looks to Boost Military Cyber Experts Amid Security Threat

According to a new report by Nikkei after viewing Ministry of Defense plans, the Japanese military is set to add hundreds of new cybersecurity specialists to its forces due to current aggression from hostile nations. The report revealed that as of 2020, there was 660 cybersecurity personnel in Japan’s Self

Read More
02 Oct 2020

OODAcast: Matt Devost on Hacking Entrepreneurship and Identifying Threats and Opportunities

In this OODAcast, the tables are turned as OODA Network Expert Jen Hoar interviews CEO Matt Devost and they discuss how Matt consistently identified new threats and opportunities by blending eccentric interests into a career as a serial entrepreneur and become an established expert on cybersecurity, counterterrorism, and technology issues.

Read More
21 Jul 2020

Seeking Security Alpha

In cybersecurity, it has long been assumed that the attacker has the advantage and that defenders must deploy a disproportionate amount of resources (time, money, etc.) to even try and maintain some parity. In this piece, we’ve conducted interviews with two successful CISOs to provide insight into how they view security alpha issues. Mark Weatherford is a highly experienced and successful CISO who has worked in the public sector at both the state and federal level and also as a CISO for multi-billion dollar commercial organizations. Our Global FS CISO currently works as the Global CISO at one of the largest financial services firms in the world and has 25 years of experience working on cybersecurity and risk management issues.

Their responses provide direct insight into how they work to improve the ROI of their program and increase attacker cost.

Read More
24 May 2019

Most security pros have considered quitting due to a lack of resources

Almost three in four (72%) security professionals have thought about quitting their jobs over a lack of resources at their organization. Almost eight out of ten (79%) companies suffer from skills and or technology shortages. The survey also shows that infosec pros actually list security staff shortages (50%) and security

Read More
07 May 2019

Physical threats rank alongside cybersecurity for many US businesses

A new study by Securitas indicates that for many organizations, physical threats are at least as important as cyber threats. It also confirms that insider threats are a massive problem, with 75% of the biggest security threats referring to activity that likely involves people within the targeted organization. The five

Read More
06 Mar 2019

Attack traffic increased by 32 percent in 2018

F-Secure observed a 32% increase in attack traffic last year compared to 2017, and the second half of 2018 saw four times more attack traffic than the first half. Moreover, the security company found that 22% of its client organizations completely failed to detect attacks against their networks and many

Read More
05 Feb 2019

Cyberattacks to watch for in 2019

Consulting company Booz Allen has released a new report outlining eight crucial cyber threats for this year, based on insights from the firm’s top analysts. The research outlines the following threats, while also discussing what companies can do to protect themselves: Information warfare will increasingly target organizations Internet of Things (IoT) devices

Read More
29 Jan 2019

Here’s What the New U.S. Intelligence Strategy Says About Cyber Threats

The United States intelligence strategy for 2019 has been released, covering seven specific themes.  Here’s how the United States Intelligence Community will deal with cyber threats: “Despite growing awareness of cyber threats and improving cyber defenses, nearly all information, communication networks, and systems will be at risk for years to

Read More
24 Jan 2019

‘Nearly all’ American networks will be susceptible to cyberattacks

The Office of the Director of National Intelligence has released a new four-year strategy for the American intelligence community. The main topic of the road-map is cybersecurity, while the document also focuses on subjects such as counter-terrorism and counter-proliferation. “As the cyber capabilities of our adversaries grow, they will pose increasing threats

Read More