Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • The Problem With Solutions To Cyber Threat Detection

    In part one, we discussed the importance of problem comprehension and its role in problem-solving. In short, part one highlighted that you can’t solve a problem you don’t understand. The paradox is that you won’t completely understand most problems. While problem-solving begins with a problem, problem framing does not happen once. Problem framing continuously evolves…

  • Optimizing Corporate Intelligence: A guide to reforming your enterprise intelligence efforts

    This post dives into actionable recommendation on ways to optimize a corporate intelligence effort. It is based on a career serving large scale analytical efforts in the US Intelligence Community and in applying principles of intelligence in corporate America.

  • DoD Seeking Innovative Ideas on Logistics For Modern Times

    Logistics has always been a critically important part of military power. But it is also, frankly, boring. There is no sizzle and little glory in moving supplies. It has always been this way. But great masters of strategy have always known the importance of transport. Here is the way Winston Churchill put it:  “Victory is…

  • Is the Paranoia About Kaspersky Lab Products Justified?

    In late March 2022, the Federal Communications Commission (FCC) placed cybersecurity firm Kaspersky Lab on the list of organization it deems a potential threat to the United States. This is the first Russian company on the list with Kaspersky Lab joining a growing list of Chinese technology and telecommunications companies that include Huawei, ZTE, China…

  • The Critical Infrastructure Defense Project: Free, Premium Cybersecurity Services Available to Hospitals and Utilities

    As Western companies continue to break ties with the Russian State (as an extension of the sanctions imposed on Russia by the U.S. and NATO),  three U.S. cybersecurity companies in the U.S. are addressing the ongoing threat of potential cyber-attacks in the U.S.  by making their platforms available to critical infrastructure entities, including the energy…

  • IriusRisk’s Open-Threat Model (OTM) Standard Available via Creative Commons License

    In 2014, Elon Musk applied the open-source philosophy to Telsa patents (to foster innovation and “create a common, rapidly-evolving technology platform”) making all the company’s patents available for public use. The automated threat modeling company IriusRisk may have similar motivations for the rapid market creation of an open-standard threat modeling tools marketplace, with the added…

  • Crafting a Humanitarian Surge to Respond to the War on Ukraine

    The Russian invasion of Ukraine has placed an extraordinary burden on civilians and civilian infrastructure. According to the UN High Commissioner for Human Rights, as of March 20, 2022, 902 civilians have been killed and another 1,459 have been wounded. This casualty rate is likely much higher and will certainly increase as the conflict continues.

  • Using Artificial Intelligence For Competitive Advantage in Business

    AI technologies are making continuous advances in domains like industrial robotics, logistics, speech recognition and translation, banking, medicine and advanced scientific research. But in almost every case, the cutting edge AI that drives the advances drops from attention, becoming almost invisible when it becomes part of the overall system. The fact that most AI use…

  • The March 2022 OODA Network Member Meeting: Core Themes Emerge from Five Scenarios for War’s End

    To help members optimize opportunities and reduce risk, OODA hosts a monthly video call to discuss items of common interest to our membership. These highly collaborative sessions are always a great way for our members to meet and interact with each other while talking about topics like global risks, emerging technologies, cybersecurity, and current or…

  • Why is cyber threat detection so hard?

    Why is cyber threat detection so hard? The most obvious reason threat detection is hard is that “threat” is too abstract to solve. It may seem obvious, but effective problem solving requires problem framing. Hence, everyone involved in the process clearly understands the problem and what it is not. We get distracted by vague and…


OODAcasts

OODAcons

  • OODAcon 2025

    OODAcon 2025

    We are in the planning stages of OODAcon 2025, which will be held 29 October 2025 at the Hyatt Regency Reston. For an overview of last year’s OODAcon see: OODAcon 2024 Welcome to OODAcon 2025

  • OODAcon 2023

    OODAcon 2023

    OODAcon 2023 October 25th – Reston, VA The anticipation of disruptive technologies has allure for those of us trying to develop informed strategies about the future, but what if those disruptive technologies already exist today? Our theme for this year’s OODAcon is FUTURE NOW as we focus on the technologies, ideas, and risks that exist right now…

  • OODAcon 2024

    OODAcon 2024

    The conference will feature an impressive lineup of speakers—pioneers who are steering the direction of their respective fields towards a unified vision of the future. OODAcon 2024 is your arena to witness, participate, and contribute to the dialogue that drives innovation forward. Join us in hacking the future, together, as we navigate the complexities of…