The Third Decade Problems

Meaningful work is the opus of a successful career and over the past two decades, I’ve had the humbling honor of working impactfully on important issues.   In the early and mid-90’s, I helped identify the next generation of conflict in the…


Top 10 Security, Technology and Business Books of 2018

My annual compilation of top books is up over at OODA Loop. Enjoy. Top 10 Security Technology and Business Books of 2018 - OODA


Top 10 Security, Business, and Technology books of 2017

I've compiled my annual list of top books.  Not your typical top ten list.  Check it out at OODA Loop


Best Security, Business, and Technology Books of 2016

"Dozens of times per year, I get asked to recommend my favorite books so I couldn’t say no when the OODA Loop team asked me to build on Mark Mateski’s popular Red Teaming book list by providing my top 10 books for 2016. I have very eclectic…


Every Cyber Attacker is an Insider

"What enterprise executives need to realize is that in today’s environment, every cyber attacker is a potential insider. Given the prevalence of BYOD (bring your own device), supply chain integrity issues, foreign travel, and the plethora of…


10 Red Teaming Lessons Learned Over 20 Years

I've written a few popular blog posts over at OODA Loop. Here is one I did on red teaming lessons learned. "I often get asked what lessons I’ve learned over the past twenty years, so I started putting together this list of 10 lessons learned over 20…


State Sponsored Cyber Threats - The Long View

"Thinking about state-sponsored cyber threats over the long term doesn't come easy to Western strategists. This essay takes a look at at the strategic implications of thinking only in the short-term." Source: OODA Loop - State Sponsored Cyber…


Chinese IW - 1996

Digging through some old files and found this from 1996: ::::::::::::::::::::: May 10, 1996, Friday SECTION: Part 3 Asia-Pacific; CHINA; MILITARY; EE/D2609/S2 LENGTH: 308 words HEADLINE: INFORMATION WARFARE; China: characteristics of information…


Dronegate: The First Casualty is our Cybersecurity Paradigm

Out of respect to the original blog, my comments on this article can be found by following the link below the excerpt. These are important issues and we should be examining and debating them in detail. "As of yet, there is no definitive narrative…


Using hackers as a national resource

Misha Glenny's TED talk entitled "Hire the Hackers" was sent to me about a dozen times today. I was reminded of the excerpt below taken from my 1995 thesis. Reviewing it after all these years, it is not perfect, but does raise some important points…