Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • What You Need To Know About Hostile Social Manipulation

    A recent RAND report looks at the role of information warfare and how targeted social media campaigns and similar approaches are deployed to cause damage to a state. RAND has coined the term “hostile social manipulation” to capture this phenomenon, which builds on familiar influence techniques including propaganda and disinformation. Hostile social manipulation is used…

  • OODA Network Interview: Gary Harrington

    Gary Harrington’s career in special forces and the CIA could be the basis for  a very successful action movie.  For over thirty years, he directly planned or executed dozens of unconventional warfare operations on our Nation’s adversaries.

  • For Executive Protection, Physical and Cyber Security Have Fully Converged

    Managing the nexus between physical and cyber security is possible with a deliberate mindset and full cooperation and integration between the two teams.  Physical security practitioners should view cyber defense experts as a vital component of their risk management strategy.

  • Cyber Threat Analysis Report Volume 1 Edition 11

    OODA’s Cyber Threat Analysis Report provides the “so what” behind the news and events we track on a daily basis. When it comes to putting cyber news in context, there really is no substitute for experience. The context in this report is provided by one of the most highly regarded cybersecurity practitioners and pioneer of…

  • Quantum Supremacy Is Here: The History Making Quantum Computing News We Have Been Anticipating Has Now Been Reported

    Months ago we began to formulate an assessment that a history-making announcement in quantum computing was about to be made. For years the big players in quantum research, including IBM, Microsoft and Google, have been pursuing different methods of using quantum effects to do new calculations. Google had even made announcements indicating they thought they…

  • Mitigating Threats to Commercial Space Satellites

    The space domain is transforming into an increasingly contested and congested environment. The President has referred to it as a critical warfighting domain and in response, the Department of Defense has recently established U.S. Space Command as a unified combatant command to employ space capabilities and lead space operations. In the private sector, we have…

  • Deception Needs to be an Essential Element of Your Cyber Defense Strategy

    In the cyber defense community, we talk about a wide-range of risk mitigating technologies, strategies, and activities.  We talk about attacker deterrence and increasing costs for the attacker.  We invest in endpoint agents, threat intelligence, DLM, and other mitigating technologies on a daily basis. Here’s why one of the most compelling emerging use cases for…

  • The Executive’s Guide to Cyber Insurance

    This special report provides an overview of the dynamic trends underway in the cyber insurance market, including actionable information that executives can put to use right now in determining the right approach to using cyber insurance to transfer risk. The report also provides insights which can be of use to any tech firm seeking to…

  • Which CIA Executive Impacted Snowden’s OODA Loop?

    Edward Snowden’s new book is out next Tuesday, but OODA Loop got an advance copy.  In the book, Snowden identifies two major catalysts that not only pushed him over the edge, but also informed his strategy for how he leaked the highly classified material.  One of them was a complete surprise.

  • Cyber Threat Analysis Report Vol 1, Edition 10

    OODA’s Cyber Threat Analysis Report provides the “so what” behind the news and events we track on a daily basis. When it comes to putting cyber news in context, there really is no substitute for experience. The context in this report is provided by one of the most highly regarded cybersecurity practitioners and pioneer of…


OODAcasts

OODAcons