For better or for worse, Large Language Models (LLMs) - used for natural language processing by commercial AI Platform-as-a-Service (PaaS) subscription offerings - have become one of the first “big data” applied technologies to become ...
Analysis
We continue our effort to underscore certain patterns and themes found throughout the OODAcast library of over 80 conversations with leaders and decision-makers.
In January 2021, OODA CEO Matt Devost interviewed Camila Russo, author of ...
Analysis
Consistent with our analysis back in November '21 - Cybersecurity and Cyber Incidents: Innovation and Design Lessons from Aviation Safety Models and a Call for a “Cyber NTSB” - the DHS has now established ...
Analysis
We strongly encourage OODA Loop subscribers to continue to prioritize tools for clear decision-making while operating in a low information environment. It is this 'tightening your OODA Loop' we want to reinforce now as we ...
Analysis
In February of 2021, Matt Devost spoke to Rob Richer, a highly regarded advisor to international executives and global government leaders including several heads of state. Rob has a well-informed perspective on international risks and ...
Analysis
The federal government will move to a "zero-trust" cybersecurity strategy by 2024. The final plan was released by the Office of Management and Budget (OMB) and includes insights from cybersecurity professionals, non-profit organizations, and ...
Analysis
As early 2020, when OODA Network Member Chris Ward wrote about the Joint All-Domain Command and Control (JADC2), there was also the growing traction and influence of two papers by Dr. Will Roper (who at ...
Analysis
To help members optimize opportunities and reduce risk, OODA hosts a monthly video call to discuss items of common interest to our membership. These highly collaborative sessions are always a great way for our members ...
Analysis
According to Emilio Iasiello in his most recent post - "What’s Really Behind WhisperGate Attacks Against Ukraine?" - Belarus is the latest move by Russia on the cyber front in the highly charged gray-zone conflict ...
Analysis
In what felt like coordinated attacks last Friday, data-wiping malware (masquerading as ransomware) hit Ukrainian government organizations and was quickly followed by an aggressive unattributed cyber attack on Ukrainian government sites. The attacks prompted ...
Analysis