Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • 10 Rules For Cybersecurity Salespeople

    The cybersecurity market is so congested, it can be difficult to establish a dialogue with overwhelmed CISOs.

  • Information – The Final Frontier of Cybersecurity

    Cyber trust is not just about securing information technology systems. You must also secure business processes.

  • Putin’s Cyber OODA Loop is Tighter Than Yours

    While hosting a delegation from France, Putin advised that to prevent cyber attacks, nations will have to establish international norms prohibiting such behavior. “This is what I can say about cyberattacks or war of words in the press and other issues. Action always causes reaction. Always. If one does not want to get a reaction…

  • Three Critical Factors Increasing Cyber Risk for 2019

    What cyber threat do China, Russia, and Iran present for the remainder of 2018 and 2019? Matt Devost provides some insight into the geopolitical elements influencing that answer.

  • Cliff Stoll Keynote

    Dr. Clifford Stoll, astronomer, professor, IT security pioneer and author of “The Cuckoo’s Egg,” discusses his ground-breaking work in IT security while at Berkeley, where he stumbled on an intrusion by hackers working on behalf of the KGB. Learn how cybersecurity began from the trailblazing researcher who invented some of the capabilities security professionals still…

  • Commanding the Trend: Social Media as Information Warfare

    This article demonstrates how social media is a tool for modern information-age warfare. It builds on analysis of three distinct topics: social networking, propaganda, and news and information sharing. Two case studies are used to show how state and non-state actors use social media to employ time-tested propaganda techniques to yield far-reaching results. The spread…

  • What did Cybersecurity and Cyberwar look like in 1999?

    Think all these news stories you are reading about cybersecurity, cyberwar, and cyberconflict are breaking new ground? It is worth taking a read through the several hundred entries meticulously compiled in Mich Kabay’s 1999 Infosec Year in Review which I recently found on an old drive while searching for other content. Some old new topics…

  • Trump: Accidental Nuclear Genius?

    Love him or hate him, when it comes to North Korea, Trump just may be frustratingly suited for nuclear negotiations. Unpredictability, emotional outbursts, irrationality, and other descriptors that have been applied to the sitting president are likely qualities a president should not have in general. According to Cold War-era nuclear deterrence theories, however, they may…

  • Best Security, Business, and Technology Books of 2017

    In looking at advances in technology over the past year, I’m reminded of the Lenin quote “There are decades where nothing happens; and there are weeks where decades happen.” It seems that to make the most sense of the top security and business trends you need to have a keen eye for advancements in AI,…

  • The 2017 Red Teamer’s Bookshelf

    “It’s been a couple of months since we first announced that Red Team Journal, Redteams.net, and OODALoop would be compiling the latest ‘Red Teamer’s Bookshelf’ jointly. For those of you who’ve been waiting, the list is finally here. It’s larger than previous years, so we’ve organized the titles by category (and yes, some of these…


OODAcasts

OODAcons