11 Nov 2021

Blockchain In Supply Chain

Is your supply chain ready for the blockchain? Cryptocurrencies are the most commonly cited examples of blockchain’s potential, but it’s the technology itself that’s attracting attention from those outside finance. From increased security and visibility to tracking complex variables related to sustainability and ethical sourcing, blockchain is set to help procurement organizations

Read More
13 Sep 2021

Intelligence, Afghanistan, and Hedging Bets

I am a member of OODA Loop. The few discussions that I have been able to listen to thus far were extremely informative, especially the most recent one on Afghanistan and intelligence issues.  It prompted a few comments on intelligence collection and hedging bets amongst regional and great power players in Afghanistan. 

This article was generated from the OODA Network Member monthly meeting and access is restricted accordingly. If you are an OODA Subscriber, but not a member of our expert network, you will not be able to access this content.

Read More
16 Mar 2021

The US must adopt Software Bill of Materials to thwart cyberattacks

Following the SolarWinds Russian espionage campaign against the US government, the White House addressed possible executive action on February 17 in response to the most systemic hack of the US government in history. However, experts have criticized the Software Bill of Material’s (SBOM) ability to prevent similar incidents, or worse,

Read More
19 Feb 2021

Michele Wucker on Identifying and Confronting the Obvious Risks of Gray Rhinos

Michele Wucker is specialist in risk management and crisis anticipation and is author of the book “The Gray Rhino: How to Recognize and Act on the Obvious Dangers We Ignore”. While we’ve all become familiar with Taleb’s concept of Black Swans, we must equally become intimately aquatinted with Wucker’s Gray Rhinos as they provide more obvious opportunities for actually anticipating and managing risk.

During this interview, Michele takes us through the concept of Gray Rhinos with real-world historical examples, discussion of future Gray Rhinos, and strategies for engaging in real actions to identify, respond to, and mitigate future Gray Rhinos in business, society, and global affairs. The concept of a Gray Rhino is hugely important and has become embedded in how we evaluate risks at OODA with our customers.

Read More
18 Dec 2019

11 Habits of Highly Effective CISOs

What does it take to be a highly effective CISO? Over the past 25 years, I’ve consulted for hundreds of executives on cybersecurity issues including direct support to dozens of CISOs working to effectively manage cyber risk in a wide variety of organizations.  With this post, I’ve attempted to capture some of the best practices from the most effective CISOs I know. In future articles, we’ll look at each of the 10 habits in greater detail, including direct input from the CISO community. 

Read More
11 Dec 2019

Data Leak Week: Billions of Sensitive Files Exposed Online

Earlier this week, separate data exposure incidents left a total of 2.7 billion email addresses, 1 billion passwords, and nearly 800,000 applications for copies of birth certificates were found on unsecured cloud buckets by security researcher Bob Diachenko. Organizations continue to fail to lock down their cloud servers, and researchers

Read More
11 Dec 2019

Here’s what will happen to your Windows 7 PC on January 15, 2020

After January 14, Windows 7 users will get no more security updates to the operating system for free, warns Microsoft. Even though users will be able to continue to run Windows 7 after January, they could potentially face more security problems. Microsoft plans to deliver a new pop up notification

Read More
09 Dec 2019

Microsoft Security: Password Problem Affecting 44 Million Users Revealed

The Microsoft threat team recently analyzed a database that contained leaked login credentials of over 44 million users, exposed from multiple security breaches. Microsoft disclosed that the information came from multiple sources, including law enforcement agencies and open source resources. In the first three months of 2019, Microsoft uncovered that

Read More
05 Dec 2019

Iran Has Launched ‘Malicious’ New Malware That Wipes Windows Computers, Warns IBM

IBM found that state-sponsored hacking group APT34 has deployed a new strain of malicious malware aimed at the industrial and energy sectors in the Middle East. APT34 was responsible for a phishing attack using LinkedIn earlier this year, but IBM claims that they are working with another group whose identity

Read More
03 Dec 2019

Report: ‘Smishing,’ Deepfakes to Continue to Rise in 2020

Experian, an American credit reporting company, published a 2020 data breach industry forecast that stated “smishing” or text-based phishing, would be the next danger to consumers and agencies. Following smishing is drones that steal customer data, disruptive deepfakes, hacktivism, and identity theft through mobile payment systems. The report claims that

Read More