Now that we are a part of OODA LLC we have increased the ability to serve you with references to the threat and in depth research on trends you will want to track and take action on faster than your competition.
For more see: OODAloop.com
Russia should be considered a kleptocracy, where the rule of law exists as long as it supports the objectives of the state and the ruling oligarchs. All U.S. businesses should exercise extreme caution before doing business in or with Russia. Our special report on The Russian Threat captures insights on the full spectrum of Russian capabilities and intention, including their actions in cyber conflict. For more read the continuously updated Russia Threat Brief
Several countries have the capability to inflict harm on U.S. interests. However, China is the only one who has declared an intent to challenge the U.S. for global supremacy. China remains a closed society where challenges to party rule are met with harsh, sole crushing response. China is a powerhouse, but one with weaknesses. The same statement carries over to military and intelligence domains. For more read the continuously updated China Threat Brief.
Iran has been investing heavily in cyber operations and is experienced in conducting both espionage and attack. Iran is undemocratic, with power centered in a Supreme Leader (Ali Khamenei). A President exists but has little power compared to the Supreme Leader. But below them is a vibrant and powerful country of over 81 million. Iranian education systems and scientific pursuits make them a technologically empowered nation that can mount surprisingly sophisticated cyber operations. For more read the continuously updated: Iranian Threat Brief.
North Korea describes itself as a “self-reliant socialist state” but it is really best described as a Stalinist dictatorship. Leader Kim Jong-un holds power and dominates all functions through a mix of violence, rewards and intense propaganda. A common misperception about the DPRK is that they are so backwards and poor that they cannot mount a modern cyber war. But reality is that their policy of “Songun” (military first) means there are resources for capabilities considered strategic, and that includes cyber war. For more read the continuously updated DPRK Threat Brief.
- Foreign Economic Espionage in Cyberspace
- The 2018 Worldwide Threat Assessment of the U.S. Intelligence Community
- Digital Risk Vulnerabilities in the Cyber War of Influence
- Ransomware Exponentially Increasing as IoT Provides New Avenues of Attack
- China Announces Goal: Narrow cyberwarfare gap with US
Open Source Threat Assessments:
- Secureworks Annual State of Cybercrime Report
- Recorded Future: The gold standard in cyber threat intelligence analysis
- Verizon Data Breach Investigations Report (DBIR): Lessons learned from breach analysis
- Verizon Data Breach Digest (DBD): Snapshots of incidents
- Microsoft Security Intelligence Report: Insights include data from crash analysis
- Symantec Internet Security Threat Report: Heavy focus on threats to consumers and small business
- McAfee Labs Threat Reports: Heavy focus on threats to consumers and business
- Accenture Cyber ThreatScape Report: Insights from an incredibly professional team serving global business
- CyberEdge Group CyberThreat Defense Report: Survey of IT and security professionals
- Trustwave Global Security Report: Focus on retail
- Wombat Security State of the Phish: Good source on what phishing is working and how to mitigate
- Groupsense Special Report on SHARK20385 A look into automated weaponization of stolen credentials and the impact to Internet forum and social media discourse