Start your day with intelligence. Get The OODA Daily Pulse.
Home > Example Query Loops
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Our Artificial Intelligence tracking, research, and analysis fall into four categories: Surfacing business strategy insights based on current AI capabilities; Tracking Responsible and Ethical AI frameworks and projects; Exponential technologies, including AI, and Great Power competition; and tracking AI applied technology in various industry verticals (along with market drivers). Following are some general AI research…
Leverage these open source tools to provide your organization with the best in class information to inform business strategy, operations, and risk awareness levels around the world. Firms that understand the strengths and weaknesses of their own Cognitive Infrastructure will have an advantage over those that do not attend to this crucial function within an…
The frequent targeting of India’s energy stakeholders is a disconcerting turn of events and underscores the increasing interest of nation states’ willingness to target critical infrastructure for their own advantage. The ability to initiate a series of strategic power outages and energy disruptions to bring a China-favorable resolution to the forefront is an equally enticing…
What should leaders do when operating in an environment like today’s, where serious threats of Russian cyber attacks against US infrastructure make a very high end attack a very real possibility? We recommend leaders consider the following four strategic actions: – Understand what is new about the threat – Contextualize the threat for your business…
Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) device vulnerabilities are, arguably, the threat surfaces that are of the utmost concern to cyber and homeland security professionals. If ICS/SCADA devices are mission-critical to your organization, the Joint Cybersecurity Advisory (CSA) released this week by multiple U.S. agencies is a must-read. A unique…
Over the past several years, there has been a rapid emergence of companies, projects, and initiatives in what is broadly categorized as Web3. While monitoring that rapid innovation, the OODA research team has noticed a disproportionately high number of cybersecurity incidents that have the potential to negatively impact the Web3 innovation ecosystem, disrupt customer adoption…
Based on the insights garnered from our November 2021 Stratigame on the Global Computer Chip Supply Chain Disruption, the following are some of the recent developments up and down the global semiconductor manufacturing supply chain and value chain.
Cognitive Bias and the errors in judgement they produce are seen in every aspect of human decision-making, including in the business world. Companies that have a better understanding of these cognitive biases can optimize decision making at all levels of the organization, leading to better performance in the market. Companies that ignore the impact these…
The United States said on Wednesday that it had secretly removed malware from computer networks around the world in recent weeks, a step to pre-empt Russian cyberattacks and send a message to President Vladimir V. Putin of Russia. When you advocate for cooperation and then act unilaterally, does that make future overtures more or less…
In 2019, the Defense Intelligence Agency (DIA) published the first Challenges to Security in Space “to address the main threats to the array of U.S. space capabilities, and examine space and counterspace strategies and systems pursued primarily by China and Russia and, to a lesser extent, by North Korea and Iran.” DIA has followed up…
In this episode of OODAcast, Megan Jaffer joins the conversation to discuss her journey in the intelligence community and the creation of Iron Butterfly Media Group. Megan also discusses the expansion of Iron Butterfly Media, including new podcast series and a documentary on women in intelligence. Megan shares her background, including her studies in international…
In this episode of OODAcast, Bob Gourley interviews Laura Thomas, a deep tech consultant and former CIA officer. Laura discusses her journey from a small town in North Carolina to a career in the CIA, where she served as a case officer. She emphasizes the importance of critical thinking and decision-making under uncertainty, and how…
Allan Friedman is a senior strategist at CISA (the Cyber Security and Infrastructure Security Agency) where he coordinates all of their cross-sector activities on the topic of SBOM: The Software Bill of Materials.
Joe Sullivan has been at the forefront of managing security risk in rapidly growing high tech companies over the past 20 years serving as the Chief Security Officer at Facebook from early start-up through the IPO, CSO of Uber and CloudFlare, and as a security leader at eBay/PayPal. Learn what motivates him and some of…
Joe Tranquillo is a Professor of Biomedical Engineering at Bucknell University and a provost at the school. He is also and author and speaker with a knack for helping make new and at times complex subjects understandable. In this OODAcast we discuss many aspects of the revolution in biological sciences with Joe including topics like:…
Charles Clancy has successfully led technology efforts in government, industry, academia and continues to lead and innovate in his current position as Senior Vice President and GM of MITRE Labs. He is MITRE’s Chief Futurist. His role in technology leadership and his tracking of tech across multiple domains made for an incredibly insightful OODAcast. We…
Mark McGrath has applied the teachings of John Boyd to a career that began in the Marine Corps, included leadership positions in financial services firms and consulting with businesses with a need to learn to thrive in volatile, uncertain, complex and ambiguous (VUCA) environments. He co-founded the consultancy AGLX and serves as its Chief Learning…
Serene is a hacker in the truest sense of the word. She’s applied a hacker mindset to learn coding, piano, and blend art and engineering in fascinating ways. You’ll find her collaborating on-stage with Grimes one night and coding censorship resistant technologies the next day. As a self-taught coder she was the first engineer hired…
Andy Bochman is the Senior Grid Strategist-Defender for Idaho National Laboratory’s National and Homeland Security directorate. In this role, Andy provides strategic guidance on topics at the intersection of grid security and climate resilience to INL leadership as well as senior U.S. and international government and industry leaders. Andy is a frequent speaker, writer, and trainer…
Spencer Ante is the author or “Creative Capital: Georges Doriot and the Birth of Venture Capital”, which was on my Top 10 book list for 2022. In fact, I found Doriot’s story so compelling that a portrait of him hangs on the wall at the Hack Factory start-up studio in Reston, VA. Doriot is a…
Copyright © 2025 — All Rights Reserved.
Notifications