cyberwarfare strategy theory FI

Asynchronous Warfare, Part 4: OODA-Loop 2.0 and the Four Golden Rules

By Dr. Dennis Prange and edited by Andy Norton NOTE: This is part 4 of a 4-part series on Asynchronous Warfare. In part 1 of this blog series, we described the roots ...
IoT security FI

Can Smart Lighting Beat a Hacker? How Machine Learning Can Boost IoT Security

It’s possible: Smart lighting could be the most dangerous element in your company’s network. By 2025, there will be 75 million IoT devices in use. Smart devices are now found throughout most ...
Asynchronous Warfare, Part 2: Strategy and Phases

Asynchronous Warfare, Part 2: Strategy and Phases

By Dr. Dennis Prange, edited by Andy Norton NOTE: This is part 2 of a 4-part series on Asynchronous Warfare. Please watch for other segments over the next several weeks. In part ...
digital security small business owners FI

Think Your Business Is Too Small to Get Hacked? Wake Up!

Sixty percent of small- to mid-sized businesses (SMBs) go bankrupt six months after suffering a cyberattack. The risk is simply too great. SMBs need to strengthen their digital security. Uber…Equifax…Yahoo…if you look ...
machine learning for cybersecurity FI

How Machine Learning for Cybersecurity Can Thwart Insider Threats

While there are innumerable cybersecurity threats, the end goal for many attacks is data exfiltration. Much has been said about using machine learning to detect malicious programs, but it’s less common to ...
phishing emails FI

Can You Stop Phishing Emails? Why What You’re Doing Now is Failing.

Phishing emails are not new. Despite broad coverage in the press, numerous corporate training programs, and many anti-phishing solutions, why are a massive 93% of data breaches still caused by phishing? With ...