top of page
Matthew Wold
Subscribe to Newsletter
All Posts


Case Study: The UNFI Cyberattack
Cyberattack on UNFI disrupts groceries, pharmacies, and investor confidence nationwide.

Matthew Wold
Jun 113 min read
Â
Â
Â


Cyber Terrorism: When Modern Extremism Goes Digital
Cyber terrorism exploits digital systems to disrupt, intimidate, and instill fear.

Matthew Wold
Jun 87 min read
Â
Â
Â


Security Case Study: Coinbase - An Insider Threat Story
This isn't a crypto story, it's an insider threat story.

Matthew Wold
May 253 min read
Â
Â
Â


The Silent Threat Within: Confronting Insider Risks in Cybersecurity
Insider threats account for 47% of data breaches globally

Matthew Wold
May 165 min read
Â
Â
Â


Covert by Design: OpSec for Cybersecurity Professionals
In the world of cybersecurity, Operational Security (OpSec) is essential for conducting investigations without alerting adversaries or...

Matthew Wold
May 15 min read
Â
Â
Â


When Protest Goes Digital: How Governments Can Defend Against Hacktivism
As hacktivism grows, governments must defend against digital threats while respecting digital activism.

Matthew Wold
Apr 254 min read
Â
Â
Â


Wired for Reflection: Revisiting the Internet with Tubes
Tubes is a look at the internet’s physical roots and a nostalgic nod to its early days.

Matthew Wold
Apr 242 min read
Â
Â
Â


Digital Dissent: How Hacktivists Wage Asymmetric Political Warfare
How decentralized cyber activism is reshaping power dynamics in the 21st century.

Matthew Wold
Apr 235 min read
Â
Â
Â


Asymmetry in Cyberspace: How Small Nations Take on Global Powers
Small nations are increasingly leveraging cyber warfare and demonstrating that in cyberspace, even limited resources can yield significant geopolitical influence.

Matthew Wold
Apr 105 min read
Â
Â
Â


The Blurred Line: Why Cyber Operations Are Terrible at Signaling but Still Shape Statecraft and Warfare
Cyber operations have become a powerful tool in modern geopolitics, allowing nation-states to spy, disrupt, and even sabotage their...

Matthew Wold
Apr 24 min read
Â
Â
Â


Why a Strong Understanding of Geopolitics is Essential for Cyber Threat Intelligence
A firm grasp on geopolitics is crucial for cyber threat intelligence professionals.

Matthew Wold
Mar 213 min read
Â
Â
Â


Patriot or Traitor: Was Snowden's Risk Worth It?
Edward Snowden’s leaks exposed mass surveillance, was it worth it?

Matthew Wold
Mar 154 min read
Â
Â
Â


The Silent Battlefield: How Social Unrest Poses Unique Challenges For Government Cybersecurity
Cybersecurity teams need to be extra vigilant during times of social unrest.

Matthew Wold
Mar 97 min read
Â
Â
Â


The Evolution of Hacking: From Hobbyists to Nation-State Actors
Hacking has evolved from a hobbyist subculture into a battlefield. Here's a brief history of that evolution.

Matthew Wold
Mar 54 min read
Â
Â
Â


Decompiled: Thwarting A Financial Scam
Cybercriminals are constantly refining their tactics to exploit trust and urgency, often targeting unsuspecting individuals through...

Matthew Wold
Feb 193 min read
Â
Â
Â


Mapping A Financial Scam to the Cyber Kill Chain.
Mapping financial scams to the Cyber Kill Chain, detailing attack stages, scam tactics, and prevention tips.

Matthew Wold
Feb 124 min read
Â
Â
Â


Is The Cuckoo’s Egg still relevant to the modern cybersecurity landscape?
This firsthand account of computer espionage follows a year-long, solo investigation to track down a hacker who stole sensitive American...

Matthew Wold
Feb 83 min read
Â
Â
Â
bottom of page