Start your day with intelligence. Get The OODA Daily Pulse.
Home > Example Query Loops
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
The conduct of U.S. military cyber operations has significantly shifted—particularly in the last year. The Department of Defense’s newest cyber strategy, issued in September 2018, emphasizes a “persistent engagement” approach that moves the Department from a reactive state into a more proactive, assertive stance against national security threats in the cyber domain. This is also…
Neal Pollard is the CISO of UBS and has steadily built his career to safeguard people and information in a time of terrorism and cyber threats. Neal knows that how we respond to a significant incident can be the difference between success and failure. Read about how he has honed his career to become an…
Bobbie Stempfley has made huge contributions to our national cyber defense efforts for three decades through leadership roles within DISA, DHS, and now as the head of the CMU CERT. In this interview, Bobbie highlights her path in the industry and provides insights for future security concerns and building resiliency into your technology and organization.…
The use of deniable actors is hardly unique to Russia, but the state’s complicity and even outright involvement in organized crime is. OODA’s reports “The Russian Threat” suggests that “Russia should be considered a kleptocracy, where the rule of law exists as long as it supports the objectives of the state and the ruling oligarchs.”…
Putin’s Russia has demonstrated a penchant for relying on proxies to provide a degree of deniability while pursuing its military objectives. As noted in Christoph Zürcher’s book The post-Soviet wars: Rebellion, ethnic conflict and nationhood in the Caucasus, Putin’s popularity emerged in large part due to his successful resolution of the conflict with Chechnya, which…
The December 2016 “Grizzly Steppe” joint analysis report issued by the FBI and DHS provided a table of monikers attributable to various Russian cybercriminal organizations serving the state’s intelligence services. However, understanding what these names refer to is a challenge in and of itself. As noted by Florian Roth in a 2018 Medium article, similarities…
Humans are more connected now than ever before. However, half the global population is behind on the digital revolution and there is great regional disparity in the availability of affordable Internet. While reports show a growth rate of one million new users a day from 2018-2019, approximately 3 billion people are still not connected. SpaceX,…
Rama Polefka at Black Mountain Dynamics noticed a trend a long time ago: Young companies need a robust, powerful, secure IT infrastructure. But their founders are often so busy creating the company, the IT lags behind and compromises their growth. He has spent his career working with startups to grow their IT at exactly the right…
OODA is pleased to announce that our Future Proof conference will be held on March 19, 2020 in Tysons Corner, Virginia. The Future Proof conference brings together the hackers, thinkers, strategists, disruptors, leaders, technologists, and creators with one foot in the future to discuss the most pressing issues of the day and provide insight into…
A recent RAND report looks at the role of information warfare and how targeted social media campaigns and similar approaches are deployed to cause damage to a state. RAND has coined the term “hostile social manipulation” to capture this phenomenon, which builds on familiar influence techniques including propaganda and disinformation. Hostile social manipulation is used…
Bob Zukis is a man on a mission to improve the ability of corporate America to succeed in a complex digital world, even when under constant cyber attack. Bob is the CEO and founder of the Digital Directors Network, the global pioneer in helping corporate directors advance their understanding of systemic risk. We consider Bob…
Adam Shostack is widely known in the cybersecurity world for his pioneering work on disclosing and discussing computer vulnerabilities (the CVE (common vulnerabilities and exposures) list). He also helped formalize and train leading approaches to threat modeling and wrote the foundational book on the subject (Threat Modeling: Designing for Security). In this OODAcast we seek…
Sebastian Mallaby joined the OODAcast for a discussion about the Power Law in venture capital and the rise of the global hedge fund and private equity industries.
Neil Wiley has lead some of the US Intelligence Community’s most important analytical functions. His career in intelligence began as a Naval Intelligence Officer in an operational intelligence center focused on support to critical operational naval missions. He would later serve joint intelligence missions in Europe, would rise to lead all analytical activities at the…
This OODAcast features a fascinating conversation with Michael Gibson, the author of the book “Paper Belt on Fire” who is also the co-founder of the Thiel Fellowship program and the 1517 Fund, both of which focus on identifying unconventional ideas and individuals that can drive disruptive innovation in technology, arts, and science.
In this OODAcast, we talk with Jimmy Soni, the author of the book “The Founders: The Story of PayPal and the Entrepreneurs Who Shaped Silicon Valley”. Jimmy takes a deep, historical look at the founding story of PayPal with detailed analysis, interviews, and access that you won’t find in any other telling of the PayPal…
In this OODAcast we interview one of our close friends and OODA network members, Jen Hoar. Jen is a former journalist-turned-corporate investigator who has leveraged the potent act of asking, and listening, to turn strangers into sources and contacts into clients. Her expertise, which is clearly also her passion, is identifying and interviewing smart people…
Covering technology issues, and specifically cybersecurity as a journalist is a tough endeavor. Some of these technologies are complex as are the security vulnerabilities often inherent in their deployment and making these topics broadly accessible can be a challenge. Many of the underlying issues touch upon national security and civil liberties creating an interesting nexus…
Lawrence Gasman has researched and reported on quantum technologies from the beginning of the discipline of quantum computing. He is now the President of Inside Quantum Technology (IQT), which provides in-depth business intelligence for the quantum technology industry. IQT also runs several major quantum technology conferences as well as a quantum industry news service. On…
In 2020, we launched the OODAcast video and podcast series designed to provide insightful analysis and actionable intelligence to decision makers. In this 100th episode, co-hosts Matt Devost and Bob Gourley review some of the key insights from the series. Matt and Bob also discuss a OODA’s recent assessment of risks and opportunities given the…
Copyright © 2025 — All Rights Reserved.
Notifications