With the Taliban back in control in Afghanistan, and with the departing US forces having left behind a lot of equipment and hardware, the CTI community is keeping an eye on the inevitable shifts in cyber threats arising from or involving Afghanistan.
Cyber criminals' business models are evolving, often drawing on practices borrowed from the very businesses they attack. This should give hope to the victims of cyber crime because a more structured and formalised cyber crime marketplace is easier to scrutinise, realign, regulate, and possibly decimate, especially if state actors get involved in countering strategies.
Whether rational, rationalized, emotional, irrational, or intuitive, our behaviours are signals to others about where we are operating from. Taking time to clarify your understanding of your internal mechanisms at play will significantly improve your messaging to the external world. Messaging as revealed by your behaviours and decisions.
Private-sector organisations have different response options available utilising CTI than governments or militaries. Learning what is important to the organisation affects what to look for when distilling and analysing. This post will help understand how to create CTI relevance for the business.
Developing operational resilience - an organisation's ability to continue functioning through failure - requires reconsidering what brings the effect of shock and volatility closer to zero. Looking to the relative resilience in place twenty or more years ago, the need for analogue solutions in digital spaces becomes apparent.
Conversations on authenticity in professional environments are becoming more common, recognising a need to address inauthenticities in business. The challenge is the degree of misinterpretation fostered, as considering certain factors reveal consistency requiring adjustment depending on scale. The Dark Knight's Joker will help demonstrate.
BLUF - This is merely observation of leadership qualities I've seen exemplified. A true leader displays characteristics often overlooked (or paid lip service) by others. The purpose here is to capture some of what was learned, remembering what counts as we move forward. -scl
Our bodies ingest volumes of data daily to determine a relative threat, with internal experiential shifts raising alerts to our attention. Despite the threat volume and growing impacts observed, our bodies don't interpret danger during the time spent in digital space. Increasing individuals' sensory data variety opens new opportunities for threat indications to invoke physiological response - sensing digital danger just as we do physically.
Predicting and influencing actions before crucial incidents or decisions are made requires considerations Left of Launch. Whilst normally reserved for adversaries, how we gain ground for preventative programs within an organisation without clear evidence forces internal analysis focused prior to decision-making.
Whilst cyber catastrophes make headlines, the parallels to natural disasters or acts of war are missing vital pieces necessary for response options to become available. Examining the absent portions -provisions where we stand at present and how far we've to go.