Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • OODA Special Report: The Kinetic Potential of Russian Cyber War

    The proliferation of cyber physical systems (CPS) has increasingly enabled cyber actions to have direct kinetic effects on tangible infrastructure, even as cyberspace itself depends on tangible infrastructure vulnerable to kinetic damage. This report focuses on Russia, a particularly important threat actor to track given their track record of brazen infrastructure attacks. It is almost…

  • Cyber Threat Analysis Report Vol 1, Edition 7

    Cybersecurity’s role in the M&A market. This analysis and more by Mike Tanji in this week’s Cyber Threat Analysis Report.

  • OODA Network Interview: Dan Wachtler

    This post is based on an interview with Dan Wachtler. It is part of our series of interviews of OODA Network members. Our objective with these interviews is to provide actionable information of interest to the community, including insights that can help with your own career progression. We also really like highlighting some of the…

  • Cyber Sensemaking Part Two: Management Lessons Learned and Essential Actions

    In Part Two of this series on Cyber Sensemaking, OODA CEO Matt Devost steps through the top management lessons learned and actions that can be taking to drive your cyber risk management program. 

  • Cyber Sensemaking – Essential Observations for the Next Five Years

    Distilling over 25 years working in the fields of cybersecurity and cyberconflict across a multitude of domains including government, corporate, think tank, and academic this article serves as a foundational distillation of observations that can be applied in any organization. In Part Two of the series, we will look at lessons learned and actions that…

  • What Business Needs To Know About The New Way DoD Will Measure Your Security Posture

    The Department of Defense is establishing a new approach they expect their contractors, and sub-contractors to leverage. This is meant to help reduce risk and mitigate many challenges observed in implementing existing security/compliance regulations in the defense industrial base. Our review of this approach leaves us optimistic that this new approach is a positive change.…

  • OODA Network Interview: Randy Brumfield

    This post is based on an interview with Randy Brumfield. It is part of our series of interviews of OODA Network members. Our objective with these interviews is to provide actionable information of interest to the community, including insights that can help with your own career progression. We also really like highlighting some of the…

  • OODA Network Interview: Tony Cole

    This post is based on an interview with Tony Cole from Attivo Networks. It is part of our series of interviews of OODA Network members. Our objective with these interviews is to provide actionable information of interest to the community, including insights that can help with your own career progression. We also really like highlighting…

  • The Cyber Threat To NASA’s Artemis Program

    NASA is enabling another giant leap for humanity. With the Artemis program, humans will return to the Moon in a way that will enable establishment of gateways to further exploration of not just the Moon but eventually the entire solar system. The initial expenses of the program will return significant advances for scientific understanding and…

  • The Key to a Defensible Cyberspace – A Look at the Work of Jason Healey and the NY Cyber Task Force

    Jason Healey has been a vocal advocate for challenging the assumptions and metrics we use to develop a defensible cyberspace and also to ensure that the networks of today continue to afford us great communication, economic, and societal benefits.  This in-depth article takes a look at Jason’s work, with a special emphasis on his NY…


OODAcasts

OODAcons