Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • The Current State of the U.S. Semiconductor Industry Shows Signs of Strategic Strength

    In March, we extended our tracking of minerals for semiconductor production to the annual Unites States Geological Survey (USGS) 2022 List of Critical Minerals, which includes minerals like Palladium, C4F6, Helium, and Scandium – all of which are used in semiconductor production and or the manufacturing of sensors and memory. In April, we provided a…

  • With Viasat Satellite Hack Officially Attributed to Russia by US and EU Allies, What Next for Satellite Security?

    On March 17th, CISA and the FBI issued a Joint Cybersecurity Advisory for the SATCOM ecosystem, following the cyberattack on the Viasat Satellite system.  That same week, OODA Loop contributor Emilio Iasiello provided an analysis of satellite security in the context of overall cybersecurity: “The cyber threat to satellites has been a longstanding concern and…

  • CISA Granted Subpoena Power as Cyber Incident Reporting Bill Signed into Law

    There are so many important headlines we do not want to get lost ‘below the fold’ for our membership, and this update is one of those headlines. On March 2nd, the Senate unanimously passed the Strengthening American Cybersecurity Act. A vital piece of the consolidated legislation was a cyber incident reporting bill. On March 11th, lawmakers…

  • OODA On Corporate Intelligence In The New Age

    We strongly encourage every company, large or small, to set aside dedicated time to focus on ways to improve your ability to understand the nature of the significantly changed risk environment we are all operating in today, and then assess how your organizational thinking should change. As an aid to assessing your corporate sensemaking abilities,…

  • Gradually, then suddenly, the business environment has changed

    In a famous line from Hemingway’s The Sun Also Rises, a character in the story is asked how he went bankrupt. His reply: “Two ways… gradually, then suddenly.” This line is a catchy way to articulate the way compounding interest works in finance. It is also a good description for the S-Curve that is so…

  • Costa Rica in a State of Emergency: Is Conti Gang Cyber Attack a “Sphere of Influence” Shot Across the Bow?

    Since yesterday, on the day when a new president took the helm in Costa Rica, a state of emergency was declared in the country based on the impact cyber-attack by the Russia-affiliated Conti Ransomware Gang.  Following is what the journalist trade calls a “tic-toc” of the incident – with a formative analysis of mitigation efforts…

  • Opinion: DHS Disinformation Governance Board Needs to Be Sunk Before It Gets Out of Dock

    In May 2022, the Department of Homeland Security (DHS) announced the creation of a Disinformation Governance Board, a new internal working group within DHS with the mission of ensuring these protections are “appropriately incorporated across DHS’ disinformation-related work and that rigorous safeguards are in place.”  Per a fact sheet released by DHS, this group will…

  • The U.S. State Department Offers a $10 Million Bounty for Information about Conti Ransomware Gang Members

    The Department of State is offering a reward of up to $10,000,000 for information leading to the identification and/or location of any individual(s) who hold a key leadership position in the Conti ransomware variant transnational organized crime group. In addition, the Department is also offering a reward of up to $5,000,000 for information leading to…

  • The NSO Group’s Pegasus Spyware: A Global Update

    Since our expanded coverage in July of last year of Project Pegasus – a cadre of global news organization’s exhaustive investigation of the Pegasus “zero click” surveillance software – there have been many developments related to the spyware – including legal, national security and geopolitical activities pointed directly at the NSO Group (the Israel-based developer…

  • Open Source “Protestware”: Sabotaging Open-Source Code as a Form of Hacktivism

    OODA Loop readers will know more than most the two biggest uses of the term “Open Source.” We frequently write about both. In the context of intelligence, Open Source means information that does not come from classified channels. In terms of software, Open Source means software developed and managed in an open way, generally using…


OODAcasts

  • Lou Manousos, CEO of RiskIQ, On Reducing Adversary Attack Paths

    Lou Manousos, CEO of RiskIQ, On Reducing Adversary Attack Paths

    Elias (Lou) Manousos is a recognized expert in Internet security and fraud prevention. He has been developing and delivering enterprise protection technologies for more than 15 years. As CEO of RiskIQ, he has spearheaded a new approach that helps Internet, financial services, healthcare, media and consumer packaged goods companies protect their brands from online fraud.…

  • Operational Cybersecurity Leader Cameron Over

    Operational Cybersecurity Leader Cameron Over

    Cameron Over leads the Cyber & Privacy service line at CrossCountry Consulting. Cameron has extensive past performance in cybersecurity, including experience advising organizations with transforming their cybersecurity and privacy programs. Cameron has been in the field of information security since the late 90’s. From mid-high school, she was exposed to early network discovery techniques while…

  • Cybersecurity Icon Phil Reitinger, CEO of the Global Cyber Alliance

    Cybersecurity Icon Phil Reitinger, CEO of the Global Cyber Alliance

    Phil Reitinger has been been a pioneer in cutting edge concepts for reducing risks in cyberspace for years. He was a special assistant US Attorney in the late 1990’s, a time when high end nation state attacks were on the rise and the application of US law to help counter threats was in a nascent…

  • Serial Entrepreneur Henry Harrison, CTO of Garrison, On Disrupting Adversary Attack Paths

    Serial Entrepreneur Henry Harrison, CTO of Garrison, On Disrupting Adversary Attack Paths

    In this episode of the OODAcast, Bob discusses the creative process and technology management approaches of Henry Harrison, CTO of Garrison Computing. Henry is a seasoned technology industry executive and serial entrepreneur who has spent the last ten years focused on cyber security both as an independent consultant and as Technical Director for Cyber Security at…

  • Quantum Security Practitioner Jane Melia of QuintessenceLabs

    Quantum Security Practitioner Jane Melia of QuintessenceLabs

    In this OODAcast we dive deep into topics of Quantum Computing, Quantum Security and best practices for ensuring your data remains safe even after quantum computers can break current asymmetric encryption methods. Our guest, Dr. Jane Melia of QuintessenceLabs, is a practitioner who has spent years helping create and bring to market advanced enterprise technologies.…

  • Former CIA CTO Bob Flores on Accelerating Technology Disruption

    Former CIA CTO Bob Flores on Accelerating Technology Disruption

    OODA CTO Bob Gourley was joined by former CTO of the CIA Bob Flores in a discussion on the state of enterprise technology, resulting in this next in our series designed to provide actionable insights to leaders in business and government. Bob is a member of the OODA Network and was one of the scheduled…

  • Tony Cole On Deception In Cyber Operations

    Tony Cole On Deception In Cyber Operations

    OODA CTO Bob Gourley was joined by Tony Cole of Attivo Networks in an interactive discussion on the state of cybersecurity, with a focus on how deception technologies can be leveraged by organizations of all sizes to mitigate risks. Tony is an icon in the cybersecurity community. He is known both as a practitioner and…

  • Lewis Shepherd on Government Mission Needs

    Lewis Shepherd on Government Mission Needs

    In this second of a two part OODAcast, OODA CTO Bob Gourley was joined by Lewis Shepherd, seasoned federal technology executive and a senior director of technology strategy at VMware for an interactive discussion on the actionable lessons we should all be learning from the current crisis but also how the events of today are…

  • David Bray On Today’s Global Risk Environment

    David Bray On Today’s Global Risk Environment

    This is part two of our series with Dr. David Bray of the Atlantic Council’s Geotech Center. This second of two parts covers questions businesses should be asking about today’s global risk environment and approach to knowing what comes next. The session is full of important advice on how to survive and thrive in and…

  • Dan Gerstein of RAND Corporation on The Story of Technology
    ,

    Dan Gerstein of RAND Corporation on The Story of Technology

    OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation.  Dan is also the author of the recently released book entitled “The Story of Technology”.

OODAcons