For many organizations, the pacing factor in the deployment of Artificial Intelligence solutions is not the functionality of the AI, but problems in mitigating the issues caused when AI goes wrong. In this video for OODA members we provide a succinct introduction to key issues of AI in a way that will help you optimize…
This post is based on an interview with Dr. Christopher Ahlberg, CEO and Co-Founder of Recorded Future. It is part of our series of interviews of OODA Network members. Our objective with these interviews is to provide actionable information of interest to the community, including insights that can help with your own career progression. We…
The phrase Internet of Things (IoT) is a useful way to force thoughts on the new architecture emerging around embedded computing and ubiquitous communications. IoT devices are with us now and are proliferating at home, in our cars, on trains, planes, cities, buildings are factories. There are many design choices we all need to make…
The annual Verizon Data Breach Report has become a reliable and consistent source of cybersecurity attack trends over the past several years. Verizon has just released this year’s report with the largest number of contributing organizations ever. Here is OODA’s hot take.
“You’ve got to read what this kid is writing out of his basement at the University of Vermont…” – recently retired CIA officer to intelligence and military colleagues in 1994. A candid 25 year retrospective on a thesis that launched a tremendous amount of dialogue and action on the issues of information warfare, cyberterrorism, and…
A list of the top 10 routinely exploited vulnerabilities has been provided in a new joint alert distributed via the U.S. CERT website. This alert was issued by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the broader US Government to provide technical guidance for security professionals in both…
The Intelligence Workstation of the Future will empower analysts in new ways, combining the most modern analytical and visualization tools with enterprise security and governance technologies. This post explores this workstation, leading to actionable recommendations that organizations can put in place now to bring this concept to reality sooner vice later.
Smartphones ushered in a wave of mobile computing that has swept over every industry and just about every business in the economy. And with smartphone market penetration among individual users in the US reaching 90% it is clearly a platform that will endure for years. But where will this trend take us next? This special…
Analysis of enterprise data is a dynamic endeavor. As new tools and applications are found to handle business use cases, new data arises that in many cases produces new opportunities, but these may require new approaches to analysis and selection of new tools. This report seeks to provide some planning assumptions in this dynamic world…
We spend a lot of time thinking through emergency scenarios and the strategies that enable risk mitigation and opportunity exploitation around the world. Covid-19 provides a nearly unprecedented disruption at a global level that is reshaping our lives, economy, and culture. Here are some of the emergent ideas that are on my radar screen surrounding…
OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation. Dan is also the author of the recently released book entitled “The Story of Technology”.