The Latest in IT Security

Posts Tagged ‘Strategy’

The name “John Boyd” and the term “OODA Loop” are probably familiar to many of the readers of this blog. I’ve mentioned one or the other in 2006, 2007, 2009 (twice), and 2014. Boyd was a fighter pilot in the Korean war and revolutionized thinking on topics like fighter design and military strategy. His OODA […]

Read more ...

Capitol Hill is increasingly concerned about the lack of international laws governing cyber war. In the last week, a bipartisan group of lawmakers sent the State Department a letter urging greater attention to the issue and one House leader introduced a bill that would require the department to produce a comprehensive cyberspace strategy. The letter […]

Read more ...

In the wake of FTC v. Wyndham, government agencies are becoming more aggressive about protecting corporate data and customer privacy. But the new rules are very much a work in progress. It’s an unquestionable fact that our industry’s current state of cyber-security strategy and tactics is at best inconsistent and immature. Only the top one […]

Read more ...


Categories

TUESDAY, APRIL 22, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments