Asynchronous Warfare, Part 4: OODA-Loop 2.0 and the Four Golden Rules

By Dr. Dennis Prange and edited by Andy Norton NOTE: This is part 4 of a 4-part series on Asynchronous Warfare. In part 1 of this blog series, we described the roots of the cyberwar that we’re already fighting, which lie in proven, historic conve… Continue reading Asynchronous Warfare, Part 4: OODA-Loop 2.0 and the Four Golden Rules

Can Smart Lighting Beat a Hacker? How Machine Learning Can Boost IoT Security

It’s possible: Smart lighting could be the most dangerous element in your company’s network. By 2025, there will be 75 million IoT devices in use. Smart devices are now found throughout most commercial offices, yet a lack of security could … Continue reading Can Smart Lighting Beat a Hacker? How Machine Learning Can Boost IoT Security

Asynchronous Warfare, Part 2: Strategy and Phases

By Dr. Dennis Prange, edited by Andy Norton NOTE: This is part 2 of a 4-part series on Asynchronous Warfare. Please watch for other segments over the next several weeks. In part 1 of this blog series, we described the roots of the cyberwar that…
The … Continue reading Asynchronous Warfare, Part 2: Strategy and Phases

Think Your Business Is Too Small to Get Hacked? Wake Up!

Sixty percent of small- to mid-sized businesses (SMBs) go bankrupt six months after suffering a cyberattack. The risk is simply too great. SMBs need to strengthen their digital security. Uber…Equifax…Yahoo…if you look only at the head… Continue reading Think Your Business Is Too Small to Get Hacked? Wake Up!