Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • The Hackers Who Saved the World – Interview with Author Joe Menn

    I’ve just finished reading an advance copy of Joseph Menn’s new book Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World (Amazon Link) and can recommend highly for OODA Loop members. As the importance of hacker history goes, this was a book that was destined to be written.  I’m…

  • How a Presidential Commission Was Tracking Hackers in 1996

    The President’s Commission on Critical Infrastructure Protection is often cited as one of the most important initiatives from the 1990s that advanced our cybersecurity programs in the U.S.  The commission, which looked at cyber threats to critical infrastructure, created a lasting critical infrastructure framework that is still in use today.  In addition, it proposed the…

  • Maturing the Cyber Threat Intelligence Field into a Discipline

    My background is in operational intelligence. I started my career as a naval intelligence officer working the dynamic problems of operational fleets in real-world, ours-vs-theirs situations. I later worked joint and allied military intelligence, but still in that operational side of the field, trying to figure out what might happen in chaotic situations where adversaries…

  • Is There An Emerging Global Food Industry Resiliency Crisis?

    It is a truism that every society is only a few meals away from revolution, proven not for the first time when high food prices initiated the Arab Spring, and yet food security is a woefully neglected national security concern. America lacks a national food policy, even though we are headed towards a crisis.

  • Cyber Threat Analysis Report Volume 1, Edition 6

    The black hat hiding in the closet and other analysis by Mike Tanji in this week’s Cyber Threat Analysis Report.

  • Unmasking Maskirovka: Russia’s Cyber Influence Operations – OODA Network Expert Book Review

    Unmasking Maskirovka: Russia’s Cyber Influence Operations examines Russian ‘Information Operations’ (InfoOps) as a tool of strategic influence.  This exploration is timely and relevant given the Russian assault on the American electoral process in the 2016 Presidential election—especially since the long-range implications are still being assessed.

  • Cyber Threat Analysis Report Volume 1 Edition 5

    Why is it so hard for us to pay attention to cybersecurity? Mike Tanji analyzes the latest news and trends in the cybersecurity industry.

  • Cyber Threat Analysis Report Volume 1, Edition 4

    NIST’s Ron Ross on the state of cyber: ’We literally are hemorrhaging critical information’ After Chinese hackers infiltrated a Navy subcontractor’s computer network and stole a trove of highly sensitive data on submarine warfare, it spurred the government to revise the standards that contractors must follow to ensure government data is properly protected data. What…

  • Cyber Threat Analysis Report Volume 1, Edition 3

    Can you trust NSA tools? This and more as OODA Network Expert Michael Tanji provides insightful analysis of the most recent and significant cyber news.

  • Global security spending to top $103 billion in 2019, says IDC

    New IDC data confirms the global trend toward increased cybersecurity spending. The IDC projects spending to reach $103 billion this year, which would represent a 9.4% increase, the bulk of which is due to expanded security budgets at companies with over 500 employees. Between 2018 to 2022, spending is expected to increase by 9.2% each…


OODAcasts

OODAcons