26 Sep 2019

Cyber Threat Analysis Report Volume 1 Edition 11

OODA’s Cyber Threat Analysis Report provides the “so what” behind the news and events we track on a daily basis. When it comes to putting cyber news in context, there really is no substitute for experience. The context in this report is provided by one of the most highly regarded cybersecurity practitioners and pioneer of cyber threat intelligence (and OODA Network expert) Mike Tanji. In this edition, Mike brings context into the continual unrealistic hope that one day technology can replace wetware in cybersecurity, insights into breakability, what gets measured in our line of work, and much much more.

Read More
25 Sep 2019

Why employees still fall for phishing emails

Almost one in two employees (49%) have put their firm at risk by clicking on a link in an email from an unknown sender, yet 80% believe they can tell the difference between a genuine email and a phishing message, a new Webroot survey shows. While cybersecurity best practices discourage

Read More
12 Sep 2019

Cyber Threat Analysis Report Vol 1, Edition 10

OODA’s Cyber Threat Analysis Report provides the “so what” behind the news and events we track on a daily basis. When it comes to putting cyber news in context, there really is no substitute for experience. The context in this report is provided by one of the most highly regarded cybersecurity practitioners and pioneer of cyber threat intelligence (and OODA Network expert) Mike Tanji. In this edition, Mike brings context into the ransomware attacks against cities, the changing situation regarding best practices in perimeter defense, stunt hacking and many other hot topics you will want to track.

Read More
04 Sep 2019

What To Do About Quantum Uncertainty

The term quantum uncertainty refers to the unique property of not being able to know the direction and speed of a particle at the same time. However if you were in Washington DC area this summer quantum uncertainty could also describe the confusion of defining the quantum threat to national security and countermeasures to contain it. We imagine there may be quite a bit of quantum uncertainty in your business as well. In this post we bring a bit of clarity to this uncertainty and provide recommendations for both business strategists and government policy makers that can help prepare you for a quantum world. 

Read More
30 Aug 2019

Cyber Threat Analysis Report Vol 1, Edition 9

OODA’s Cyber Threat Analysis Report provides the “so what” behind the news and events we track on a daily basis. When it comes to putting cyber news in context, there really is no substitute for experience. The context in this report is provided by one of the most highly regarded cybersecurity practitioners and pioneer of cyber threat intelligence (and OODA Network expert) Mike Tanji. In this edition, Mike brings context into the ransomware attacks against cities, the changing situation regarding best practices in perimeter defense, stunt hacking and many other hot topics you will want to track.

Read More
28 Aug 2019

Protocol used by 630,000 devices can be abused for devastating DDoS attacks

A relatively unknown UDP protocol puts around 630,000 Internet-connected devices at risk of disruptive DDoS attacks, security researchers warn. The vulnerable Web Services Dynamic Discovery (WS-DD, WSD, or WS-Discovery) protocol is used for device discovery in solutions by companies like Axis, Sony, Bosch that follow ONVIF standards. The protocol can

Read More
23 Aug 2019

The (Dis)illusion of Control: Context on the concept of increasing cost to adversaries

Conventional wisdom is telling us that “assumption of breach” is the new normal. Some well-respected names in computer security would have you believe that the appropriate response to such conditions is to increase the cost to the attackers. If you’re too expensive to breach – so the logic goes – the bad guys will go looking for someone else. Maybe someday, when everyone makes hacking too expensive, it will stop.

Read More
23 Aug 2019

Cyber War: The Fastest Way to Improve Cybersecurity

For all the benefits IT in general and the Internet specifically have given us, it has also introduced significant risks to our well-being and way of life. Yet cybersecurity is still not a priority for a majority of people and organizations. No amount of warnings about the risks associated with poor cybersecurity have helped drive significant change. Neither have real-world incidents that get worse and worse every year.

Read More
16 Aug 2019

The Global Ungoverned Area

There are places on this planet where good, civilized people simply do not voluntarily go, or willingly stay. What elected governments do in safer and more developed parts of the world are carried out in these areas by despots and militias, often at terrible cost to those who have nowhere else to go and no means to go if they did.

Read More
15 Aug 2019

Cyber Threat Analysis Report Vol 1, Edition 9

OODA’s Cyber Threat Analysis Report provides the “so what” behind the news and events we track on a daily basis. When it comes to putting cyber news in context, there really is no substitute for experience. The context in this report is provided by one of the most highly regarded

Read More