Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Def Con is the Most Valuable Security Conference of the Year.  Here’s Why.

    There are literally hundreds of cybersecurity conferences hosted around the world each year and as a result it can be difficult to determine which conferences provided the highest value in the domain.  While each of these events bring community value in their own unique way, Def Con is the most valuable event of the year…

  • Cyber Threat Analysis Report Vol 1, Edition 9

    A Forlorn Hope No matter how much you try to spin it, cybersecurity is a cost. You can implement cheap or even free solutions to address a wide range of problems, but there has yet to be a demonstration of security adding real, sustainable value. JPMorgan Chase spends a half-billion dollars on security, but if…

  • Startup Tech CEO: How do you form a federal channel partner strategy?

    This is the next in our series of special reports for OODA members focused on federal business strategies for the Startup CEO (find them all here). This special report focuses on channel partner strategies for high tech firms.

  • The Wolf is Here: Cyber threats that have been long predicted are coming true on a daily basis

    For decades we’ve heard that iCalamity is right around the corner. For decades we’ve largely ignored pleas to try and address computer security issues when they are relatively cheap and easy, before they got too large and complicated to do at all. We have been living a fairy tale life, and absent bold action and…

  • Your Strategy For This Stage Of The U.S.-China Trade War

    What should your business do in response to the current situation between the U.S. and China? The short answer is to stay agile! We provide tips on what do do in this special report. Although trade tensions with China have been brewing for decades, the U.S. began accelerating actions in response in early 2017 and…

  • Good Cybersecurity is Not Glamorous

    One of the more common reasons why most organizations push back on spending for cyber security is the lack of a “return on investment.” All that fancy, shiny cyber-y stuff costs a lot of money without providing a clear benefit that is commensurate with the expenditure. Firewalls are expensive. IDS/IPS are expensive. SIEMs are expensive.…

  • Cyber Threat Analysis Report Vol 1, Edition 8

    We are all targets!   This story and many more in the analysis by Mike Tanji in this week’s Cyber Threat Analysis Report.

  • OODA Network Interview: Jeremy King

    This post is based on an interview with Jeremy King. It is part of our series of interviews of OODA Network members. Our objective with these interviews is to provide actionable information of interest to the community, including insights that can help with your own career progression. We also really like highlighting some of the…

  • We Learn From Death: Sadly what if it will take disaster to really improve cybersecurity

    Why are we perpetually surprised (or not, depending on how you look at it) at the failure of so many at both the organizational and individual level to take cybersecurity seriously? I would argue that most people are placing cybersecurity exactly where it should be when it comes to the myriad risks in their lives,…

  • OODA Network Interview: Mike Tanji

    This post is based on an interview with the highly regarded and proven cybersecurity professional Mike Tanji. It is part of our series of interviews of OODA Network members. Our objective with these interviews is to provide actionable information of interest to the community, including insights that can help with your own career progression. We…


OODAcasts

OODAcons