Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • CISA Outlines Agency’s Strategic Intent

    The newly formed Cybersecurity and Infrastructure Security Agency (CISA)has released a strategic intent document outlining the agencies role in protecting U.S. critical infrastructure and cyberspace.  It is important for OODA Network Members to track the emergent roles and responsibilities of this agency as it will be a critical component of cyber and infrastructure security moving…

  • The (Dis)illusion of Control: Context on the concept of increasing cost to adversaries

    Conventional wisdom is telling us that “assumption of breach” is the new normal. Some well-respected names in computer security would have you believe that the appropriate response to such conditions is to increase the cost to the attackers. If you’re too expensive to breach – so the logic goes – the bad guys will go…

  • Cyber War: The Fastest Way to Improve Cybersecurity

    For all the benefits IT in general and the Internet specifically have given us, it has also introduced significant risks to our well-being and way of life. Yet cybersecurity is still not a priority for a majority of people and organizations. No amount of warnings about the risks associated with poor cybersecurity have helped drive…

  • OODA Network Interview: Andy Lustig

    This post is based on an interview with Andy Lustig at Cooley. It is part of our series of interviews of OODA Network members. Our objective with these interviews is to provide actionable information of interest to the community, including insights that can help with your own career progression.

  • The Global Ungoverned Area

    There are places on this planet where good, civilized people simply do not voluntarily go, or willingly stay. What elected governments do in safer and more developed parts of the world are carried out in these areas by despots and militias, often at terrible cost to those who have nowhere else to go and no…

  • What You Really Need To Know About the California Consumer Privacy Act (CCPA)

    There is something you really need to know about the State of California. They have optimized around a key function that they do very very well. They know how to collect money from corporations. They know how to collect taxes, and know how to levy large fines and collect on them. The business that owes…

  • Def Con is the Most Valuable Security Conference of the Year.  Here’s Why.

    There are literally hundreds of cybersecurity conferences hosted around the world each year and as a result it can be difficult to determine which conferences provided the highest value in the domain.  While each of these events bring community value in their own unique way, Def Con is the most valuable event of the year…

  • Cyber Threat Analysis Report Vol 1, Edition 9

    A Forlorn Hope No matter how much you try to spin it, cybersecurity is a cost. You can implement cheap or even free solutions to address a wide range of problems, but there has yet to be a demonstration of security adding real, sustainable value. JPMorgan Chase spends a half-billion dollars on security, but if…

  • Startup Tech CEO: How do you form a federal channel partner strategy?

    This is the next in our series of special reports for OODA members focused on federal business strategies for the Startup CEO (find them all here). This special report focuses on channel partner strategies for high tech firms.

  • The Wolf is Here: Cyber threats that have been long predicted are coming true on a daily basis

    For decades we’ve heard that iCalamity is right around the corner. For decades we’ve largely ignored pleas to try and address computer security issues when they are relatively cheap and easy, before they got too large and complicated to do at all. We have been living a fairy tale life, and absent bold action and…


OODAcasts

OODAcons