As a third-generation executive of a family-owned printing business, I’ve had the good fortune to access incredible mentors and advisers who have bestowed amazing advice. Their counsel has followed me ...
The application of analytics to large data sets, sometimes referred to as “big data,” is still an emerging capability in the military. As a result, defense agencies and their industry partners have ...
One of the biggest challenges with risk management is that correlations are non-stationary: they jump around and raise portfolio risk when correlations spike. To combat the elevated volatility, we use ...
Data leaks, breaches, and cyberattacks are becoming the norm, spawning discussions on how organizations can effectively defend themselves against an ever-evolving threat landscape. With the modern ...
The OODA loop has been around for roughly 50 years, and we’ve referred to it within the context of cybersecurity for decades. Developed by Colonel John Boyd, the OODA loop—shorthand for observe, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results