The Power of Cognitive Maneuver: Don’t Underestimate its Value

In all fighting, the direct method may be used for joining battle, but indirect methods will be needed in order to secure victory. – Sun Tzu White paper highlighted in Small Wars Journal In 1907 President Theodore Roosevelt sailed the Great White Fleet around the world to demonstrate the military power of the United States…

Read article

GETTING TO THE POINT: A NORTH KOREAN NUCLEAR THREAT ANALYSIS

Despite the bellicose ravings of North Korea’s leader Kim Jung-un, his government’s exaggerated claims of nuclear capability and a growing list of successful cyber-attacks, North Korea remains, militarily speaking, in a geostrategic hostage standoff.  The United States and South Korea’s ability to defeat the North Korean Army has never been in doubt. 

Read article

Cyber Security: Five Top Measures to Protect Your Companies Digital Assets

I’m often asked by family and friends what they should do to protect themselves from a cyber-attack, as well as what attacks they’re susceptible to. There are so many types of attacks out there: Distributed Denial of Service (DDoS), malware injection, ransomware, adware, phishing, spear-phishing, zero-day, etc. Social engineering continues to be successful in compromising…

Read article

How Threat Tec Threat Studies are Shaping Military Decision Making

While Threat Tec utilizes the latest in threat technology, manufacturing and analysis to effectively replicate new and emerging threats, it is also capable of compiling research data to do more than training for warfare simulation. With a variety of military backgrounds and operational experience at the tactical, operational, and strategic levels, Threat Tec Subject Matter…

Read article