Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • CISA and FBI Release List of Top 10 Routinely Exploited Vulnerabilities

    A list of the top 10 routinely exploited vulnerabilities has been provided in a new joint alert distributed via the U.S. CERT website.  This alert was issued by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the broader US Government to provide technical guidance for security professionals in both…

  • The Intelligence Workstation of the Future

    The Intelligence Workstation of the Future will empower analysts in new ways, combining the most modern analytical and visualization tools with enterprise security and governance technologies. This post explores this workstation, leading to actionable recommendations that organizations can put in place now to bring this concept to reality sooner vice later.

  • The Future of Enterprise Mobile Computing

    Smartphones ushered in a wave of mobile computing that has swept over every industry and just about every business in the economy. And with smartphone market penetration among individual users in the US reaching 90% it is clearly a platform that will endure for years. But where will this trend take us next? This special…

  • The Future of Enterprise Big Data Analytics

    Analysis of enterprise data is a dynamic endeavor. As new tools and applications are found to handle business use cases, new data arises that in many cases produces new opportunities, but these may require new approaches to analysis and selection of new tools. This report seeks to provide some planning assumptions in this dynamic world…

  • Emergent Ideas Around Covid-19

    We spend a lot of time thinking through emergency scenarios and the strategies that enable risk mitigation and opportunity exploitation around the world.  Covid-19 provides a nearly unprecedented disruption at a global level that is reshaping our lives, economy, and culture. Here are some of the emergent ideas that are on my radar screen surrounding…

  • Considerations Regarding America’s Latest 5G Strategy

    At the end of March, the White House quietly released its National Strategy to Secure 5G, outlining the Trump Administration’s approach to securing fifth generation communications infrastructure at home and abroad. It was published concurrently with the president’s signing of the Secure 5G and Beyond Act, signaling alignment from the executive and legislative branches to…

  • OODAcast – A Conversation with Technology Executive Lewis Shepherd (Part One)

    In this two part OODAcast, OODA CTO Bob Gourley was joined by Lewis Shepherd, seasoned federal technology executive and a senior director of technology strategy at VMware for an interactive discussion on the actionable lessons we should all be learning from the current crisis but also how the events of today are shaping the future…

  • COVID-19 and Why Cybersecurity Can’t Wait

    Malicious cyber activity has dramatically increased over the last few weeks as bad actors rush to exploit the COVID-19 crisis. Criminal groups have wasted no time, publishing fake websites and apps riddled with ransomware to steal personal information from individuals seeking updates on the pandemic. U.S. decision-makers, rightfully prioritizing the global health emergency, may get…

  • OODA Network Interview: Tom Quinn

    Tom Quinn turned an education in the U.S. Navy into a lifetime of learning.  Read  how Tom used his military skillsets to prepare him for some of the most important positions in the country:  CISO at a the world’s largest financial firms including his current role as CISO at  Investment Firm, T. Rowe Price. “Using…

  • DHS Issues Three Warnings on Terrorist, Extremists, and Cyber Threats Relating to COVID-19

    The Department of Homeland Security has issued a series of intelligence advisories associated with threat actors exploiting COVID-19 to engage in conventional and cyber attacks.  The three separate warnings range from ISIS exploiting the global crisis for violence to extremists intentionally trying to spread COVID-19 through minority populations to cyber attackers exploiting work from home…


OODAcasts

OODAcons