top of page

The Big Blog
The Great Heist and the “Self-Attestation Gap”: Why CMMC Isn’t Random Bureaucracy
David R. Shedd didn’t come to the conversation as a commentator. He came as a former Deputy Director and Acting Director of the Defense Intelligence Agency, someone who spent a career watching adversaries play the long game. In a recent virtual discussion with CSIS’s Dr. Seth G. Jones, Shedd walked through the core argument of his new book, The Great Heist: China’s Epic Campaign to Steal America’s Secrets : over the last few decades, China has executed a structured campaign
Jan 214 min read
The Dark Web, AI Deepfakes, and the Business of Cybercrime
Cybercrime no longer resembles a loose collection of isolated actors and ad-hoc attacks. As discussed in a recent episode of Bourbon & Bytes , it operates as a mature underground economy —complete with specialization, marketplaces, service models, and increasingly sophisticated use of artificial intelligence. In this episode, Terry McGraw, CEO of Cape Endeavors, sits down with Rebecca Taylor, Threat Intelligence Knowledge Manager and Researcher at Sophos, to unpack how cyberc
Jan 73 min read
What the 2025 U.S. National Security Strategy Signals for Defense, Cybersecurity, and Industry
The 2025 U.S. National Security Strategy released in November is explicit about how the United States now defines security. It rejects vague aspirations and instead focuses on “a concrete, realistic plan that explains the essential connection between ends and means.” That clarity has consequences for defense contractors, technology providers, manufacturers, and cybersecurity leaders, because the strategy repeatedly makes clear that national power depends on economic strength
Dec 23, 20254 min read
bottom of page
