Top 10 Security, Technology, & Business Books of 2024
Welcome to 8th edition of my annual top 10 books list! Each year, I read close to 100 books and …
Start your day with intelligence. Get The OODA Daily Pulse.
Welcome to 8th edition of my annual top 10 books list! Each year, I read close to 100 books and …
A new theory proposes that consciousness may not simply reside in neuron-to-neuron communication but rather within the electric fields generated …
Climate change is rapidly becoming a major driver of forced migration. This summary explores various perspectives on climate displacement, …
Welcome to 8th edition of my annual top 10 books list! Each year, I read close to 100 books and …
The 2024 report, “Artificial Intelligence and the Future of Work,” published by the National Academies of Sciences, Engineering, and Medicine, …
U.S. policymakers are evaluating the creation of a Strategic Bitcoin Reserve. So too are U.S. States and international entities …
Assessing materiality of a breach sounds easy. But in reality it will require many corporations to re-think the governance processes …
The Annual Threat Assessment of the U.S. Intelligence Community is an unclassified report released each year concurrent with Congressional testimony …
The year 2024 will require a reorientation to new realities, largely driven by the acceleration of disruptive technologies grinding against …
Welcome to 8th edition of my annual top 10 books list! Each year, I read close to 100 books and …
The following information will help you make the most of OODAcon 2024.
The October 2024 OODA Network Monthly Meeting—held on Friday, October 18, 2024—featured guest speaker Dor Sarig, CEO & Co-founder of …
Welcome to 8th edition of my annual top 10 books list! Each year, I read close to 100 books and …
China’s cyber operations have grown into sophisticated campaigns targeting critical infrastructure. The hacking group Volt Typhoon, operating under Beijing’s directives, …
This just got serious. This is not just an intrusion or malware or an implant for future use. This is …
China’s cyber operations have grown into sophisticated campaigns targeting critical infrastructure. The hacking group Volt Typhoon, operating under Beijing’s directives, …
This just got serious. This is not just an intrusion or malware or an implant for future use. This is …
What cyber policies the new cyber team will implement remains a question, but there may be some indication of what …