Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops

Category: Business

Exponential innovation is causing exponential disruption

Author: OODA Analyst

Exponential innovation is causing exponential disruption


Analysis

  • Time For Every Company and Every Government Organization To Consider Running Both A Bitcoin and Ethereum Node

    A Cambrian Explosion in innovation in cryptocurrency related products and services is underway. The uptake in cryptocurrency interest by institutions has been so large that it is probably prudent for all businesses to review their internal strategies regarding cryptocurrencies, not just as financial assets but as a way to improve internal innovation and positioning for…

  • Five Eyes Release Joint Cybersecurity Advisory: Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure

    As OODA CTO Bob Gourley recently pointed out:  “We are so pleased with the quality of work and the professionalism in recent reporting from our government agencies on the nature of the cyber threat.  In particular, the Joint Cybersecurity Advisory (CSA) released yesterday is one of the best.”  The Joint CSA to which Bob refers…

  • Space Security and Offensive and Defensive Counterspace Capabilities

    According to the 2022 DIA Challenges to Security in Space report, “As China’s and Russia’s space and counterspace capabilities increase, both nations are integrating space scenarios into their military exercises…the expansion of Chinese and Russian space and counterspace weapons combined with the general rise of other foreign space capabilities is driving many nations to formalize…

  • Useful Standards For Corporate Intelligence

    This post discusses standards in intelligence, a topic that can improve the quality of all corporate intelligence efforts and do so while reducing ambiguity in the information used to drive decisions and enhancing the ability of corporations to defend their most critical information.

  • Opportunities for Advantage: Measuring Trends in Artificial Intelligence

    Our Artificial Intelligence tracking, research, and analysis fall into four categories: Surfacing business strategy insights based on current AI capabilities; Tracking Responsible and Ethical AI frameworks and projects; Exponential technologies, including AI, and Great Power competition; and tracking AI applied technology in various industry verticals (along with market drivers). Following are some general AI research…

  • Open-Source Intelligence Resources: UN-SPIDER, Carbon Mapper, and MapAction

    Leverage these open source tools to provide your organization with the best in class information to inform business strategy, operations, and risk awareness levels around the world. Firms that understand the strengths and weaknesses of their own Cognitive Infrastructure will have an advantage over those that do not attend to this crucial function within an…

  • China Again Targets India’s Energy Sector – Another Threat or a Promise?

    The frequent targeting of India’s energy stakeholders is a disconcerting turn of events and underscores the increasing interest of nation states’ willingness to target critical infrastructure for their own advantage. The ability to initiate a series of strategic power outages and energy disruptions to bring a China-favorable resolution to the forefront is an equally enticing…

  • Four Urgent Actions For The C-Suite To Prepare For High End Cyberattacks

    What should leaders do when operating in an environment like today’s, where serious threats of Russian cyber attacks against US infrastructure make a very high end attack a very real possibility? We recommend leaders consider the following four strategic actions: – Understand what is new about the threat – Contextualize the threat for your business…

  • Industroyer2 and Pipedream ICS/SCADA Malware: DOE, CISA, NSA, and the FBI Release Joint Cybersecurity Advisory

    Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) device vulnerabilities are, arguably, the threat surfaces that are of the utmost concern to cyber and homeland security professionals.  If ICS/SCADA devices are mission-critical to your organization, the Joint Cybersecurity Advisory (CSA) released this week by multiple U.S. agencies is a must-read. A unique…

  • Web3 Cyber Incident Database: Tracking over $62 Billion Dollars worth of cyptocurrency related incidents

    Over the past several years, there has been a rapid emergence of companies, projects, and initiatives in what is broadly categorized as Web3.  While monitoring that rapid innovation, the OODA research team has noticed a disproportionately high number of cybersecurity incidents that have the potential to negatively impact the Web3 innovation ecosystem, disrupt customer adoption…


OODAcasts

OODAcons