Thanks to the power of computing you can watch Commodore Grace Hopper delivering her landmark lecture at MIT Laboratory on 25 April 1985. The entire presentation is excellent and worth listening to. But my favorite line is right around 23 minutes in, when after describing the nature of technology innovation she says: "Probably the most dangerous phrase you could ever use in … [Read more...] about Travel Back To 1985 For A Guest Lecture By Commodore Grace Hopper on The Future of Computing
Cyber War
![]() |
Sign Up To Receive The CTOvision DailyCyberwar is a state of conflict. It is related to the technological environment and to cybersecurity, but cyber conflict comprehends those and many other topics into a greater national security construct. Today our nation faces constant adversary action and conflict in cyberspace. Meeting the challenges this adversary action causes requires an understanding of what people and companies and governments can proactively do to bring the fight to adversaries. It also involves deep understanding of adversary tactics and capabilities so we can really understand The Cyber Threat. |
We track the the history of cyber conflict, the cutting edge concept being implemented in government, the technological dimensions of cyber war, and, most importantly, the key actions you should take to help protect your personal and business information in cyber conflict. We do that by capturing the thoughts of national security experts and cyber warriors with direct experience in this very serious domain. Our thought leaders take positions, but provide you with the insights you need to evaluate whether or not you support those positions. For example, see: What If This Is The Most Important Thing The Government Can Do To Enhance Our Cybersecurity? where we advocate for the intelligence community to provide compelling insights on the cyber threat to the American people. We also encourage everyone to consider that: Now That You Are A Soldier In The Cyber War You Must Know Your Cognitive Biases For a primer on strategic topics associated with cyberwar see: Twelve Principles of DoD Cyber Conflict |
OODA and Bastille Webinar: Finding phones, wearables and gadgets through Cellular, Bluetooth, Bluetooth Low Energy and Wi-Fi device detection
You can watch this webinar on demand at: https://www.bastille.net/webinars/finding-phones-wearables-and-gadgets The webinar features insights on how to find phones, wearables and gadgets through Cellular, Bluetooth, Bluetooth Low Energy and Wi-Fi device detection. In the webinar Dr. Bob Baxley, CTO at Bastille and Bob Gourley, co-founder of OODA LLC and former CTO at the … [Read more...] about OODA and Bastille Webinar: Finding phones, wearables and gadgets through Cellular, Bluetooth, Bluetooth Low Energy and Wi-Fi device detection
Defending Against CSS Attacks in this CyberSecurity Era
Cyber security is a concern for just about everyone these days and knowing what threats are out there is a good first step towards defending yourself, your website and your data. Whether you are looking into cyber security as the owner of a website or as an internet user, there are some basic defensive questions that you will need answered. The more you understand how the … [Read more...] about Defending Against CSS Attacks in this CyberSecurity Era
OODA and CTOvision Sponsor The Intelligence and National Security Summit 4-5 Sep at National Harbor
The ability of the nation to know the many threats facing us has never been greater. It has also never been harder to do. Decision-makers in government, industry and even individual citizens are now having their cognitive processes attacked by a wide range of actors who seek to seek to shape our decisions. Traditional geopolitical adversaries like Russia and China are now … [Read more...] about OODA and CTOvision Sponsor The Intelligence and National Security Summit 4-5 Sep at National Harbor
Potential Malicious Use Of IT By NASA Astronaut While On Orbit: Thought provoking but probably not hacking
Have you been numbed by constant reports of breaches? They get old for sure, especially since so many have at their core common issues that could have been avoided by application of best practices. Now here is an interesting/new story: A NASA astronaut is accused of hacking her estranged spouse's bank account from space I have zero first-hand knowledge of this but have read … [Read more...] about Potential Malicious Use Of IT By NASA Astronaut While On Orbit: Thought provoking but probably not hacking