Rama Polefka at Black Mountain Dynamics noticed a trend a long time ago: Young companies need a robust, powerful, secure IT infrastructure. But their founders are often so busy creating the company, the IT lags behind and compromises their growth. He has spent his career working with startups to grow their IT at exactly the right…
OODA is pleased to announce that our Future Proof conference will be held on March 19, 2020 in Tysons Corner, Virginia. The Future Proof conference brings together the hackers, thinkers, strategists, disruptors, leaders, technologists, and creators with one foot in the future to discuss the most pressing issues of the day and provide insight into…
A recent RAND report looks at the role of information warfare and how targeted social media campaigns and similar approaches are deployed to cause damage to a state. RAND has coined the term “hostile social manipulation” to capture this phenomenon, which builds on familiar influence techniques including propaganda and disinformation. Hostile social manipulation is used…
Gary Harrington’s career in special forces and the CIA could be the basis for a very successful action movie. For over thirty years, he directly planned or executed dozens of unconventional warfare operations on our Nation’s adversaries.
Managing the nexus between physical and cyber security is possible with a deliberate mindset and full cooperation and integration between the two teams. Physical security practitioners should view cyber defense experts as a vital component of their risk management strategy.
OODA’s Cyber Threat Analysis Report provides the “so what” behind the news and events we track on a daily basis. When it comes to putting cyber news in context, there really is no substitute for experience. The context in this report is provided by one of the most highly regarded cybersecurity practitioners and pioneer of…
Months ago we began to formulate an assessment that a history-making announcement in quantum computing was about to be made. For years the big players in quantum research, including IBM, Microsoft and Google, have been pursuing different methods of using quantum effects to do new calculations. Google had even made announcements indicating they thought they…
The space domain is transforming into an increasingly contested and congested environment. The President has referred to it as a critical warfighting domain and in response, the Department of Defense has recently established U.S. Space Command as a unified combatant command to employ space capabilities and lead space operations. In the private sector, we have…
In the cyber defense community, we talk about a wide-range of risk mitigating technologies, strategies, and activities. We talk about attacker deterrence and increasing costs for the attacker. We invest in endpoint agents, threat intelligence, DLM, and other mitigating technologies on a daily basis. Here’s why one of the most compelling emerging use cases for…
This special report provides an overview of the dynamic trends underway in the cyber insurance market, including actionable information that executives can put to use right now in determining the right approach to using cyber insurance to transfer risk. The report also provides insights which can be of use to any tech firm seeking to…
OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation. Dan is also the author of the recently released book entitled “The Story of Technology”.