Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • The New Enterprise Architecture Is Zero Trust

    Enterprise technologists use the term “Zero Trust” to describe an evolving set of cybersecurity approaches that move defenses from static attempts to block adversaries to more comprehensive measures that improve enterprise performance while improving security. When the approaches of Zero Trust are applied to an enterprise infrastructure and workflows, the cost of security can be…

  • Sophisticated Cyber Espionage Exploits Russia and No One Says a Word

    In mid-May 2021, Russia’s Federal Security Service (FSB)’s National Coordination Center for Computer Incidentspublished a joint report with Rostelecom-Solar, the cybersecurity arm of Russian telecom company Rostelecom, about a 2020 cyber espionage campaign that targeted Russian government agencies.  The publicly-available portion of the report disclosed stealthy cyber operations that targeted key individuals associated with “the…

  • The Executive’s Guide To Mitigating The Ransomware Threat

    This is the second part of our special series on Ransomware. The first provided an update on the nature of the threat, including an anatomy of a modern attack. This post, produced with inputs from real world cybersecurity practitioners Matt Devost, Bob Flores, Junaid Islam and Bob Gourley, provides information for Corporate Board of Directors and…

  • Ransomware: The Present we Deserve?

    The scourge of ransomware is the inevitable result of decades of schizophrenia about our relationship with information technology and security. Treating this problem in the same fashion as we have those that came before it will only prolong our suffering. Clarity, creativity, and will are required if we are to have any hope of a…

  • Recent Iranian Cyber Attacks Show How Geopolitics Drive Cyber Activity

    A recent report has revealed that an Iranian threat actor group dubbed “Agrius” has been operating in Israel since 2020.  The group has been linked to cyber espionage activity and has quickly evolved into conducting destructive wiper malware attacks against Israeli targets.  What’ more, these attacks have been posing as ransomware attacks in order to…

  • Ransomware: An update on the nature of the threat

    The technology of ransomware has evolved in sophistication and the business models of the criminal groups behind it have as well. The result: The threat from ransomware has reached pandemic proportions. This post provides an executive level overview of the nature of this threat. This post is part of the OODA Cybersecurity Sensemaking series and…

  • FTC Expectations For Corporate Board Level Oversight of Cybersecurity

    The Federal Trade Commission (FTC) has published expectations for corporate board level oversight of cybersecurity. They advise every member of every board: “Don’t underestimate your role in data security oversight”. This post provides insights for OODA members on what this new guidance may mean for the future of board operations.

  • Dark Side Reports Closing Shop: What’s the Future for Ransomware Gangs?

    The ransomware attack against Colonial Pipeline revealed how disruptive this malware can be when it impacts civilian critical infrastructure.  The successful shutdown of 5,500 miles of pipeline created concern among gas-strapped populations and a government wondering if this attack was the work of cyber criminals or a foreign adversary looking for retribution.

  • President Biden Supports Cease-Fire in Call With Netanyahu

    President Biden declared his support for a cease-fire between Israel and Palestine during a call with Israeli Prime Minister Benjamin Netanyahu. Israel claims to be targeting Hamas locations and a tunnel network used by the terrorist organization via airstrikes, however, the moves have caused rising civilian casualties as well as power outages and resource shortages.…

  • Civilian Critical Infrastructure Is No Longer a Taboo Target

    Several governments including the United States recognize the criticality of protecting critical infrastructure as a national security priority.  But there is little headway in determining what, if any, operations against critical infrastructure are acceptable.  Without such consensus, nation states are left to their own devices, opting to use sanctions or retaliatory cyber strikes to register…


OODAcasts

OODAcons

  • OODAcon 2025

    OODAcon 2025

    We are in the planning stages of OODAcon 2025, which will be held 29 October 2025 at the Hyatt Regency Reston. For an overview of last year’s OODAcon see: OODAcon 2024 Welcome to OODAcon 2025

  • OODAcon 2023

    OODAcon 2023

    OODAcon 2023 October 25th – Reston, VA The anticipation of disruptive technologies has allure for those of us trying to develop informed strategies about the future, but what if those disruptive technologies already exist today? Our theme for this year’s OODAcon is FUTURE NOW as we focus on the technologies, ideas, and risks that exist right now…

  • OODAcon 2024

    OODAcon 2024

    The conference will feature an impressive lineup of speakers—pioneers who are steering the direction of their respective fields towards a unified vision of the future. OODAcon 2024 is your arena to witness, participate, and contribute to the dialogue that drives innovation forward. Join us in hacking the future, together, as we navigate the complexities of…