Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Three Critical Factors Increasing Cyber Risk for 2019

    What cyber threat do China, Russia, and Iran present for the remainder of 2018 and 2019? Matt Devost provides some insight into the geopolitical elements influencing that answer.

  • Cliff Stoll Keynote

    Dr. Clifford Stoll, astronomer, professor, IT security pioneer and author of “The Cuckoo’s Egg,” discusses his ground-breaking work in IT security while at Berkeley, where he stumbled on an intrusion by hackers working on behalf of the KGB. Learn how cybersecurity began from the trailblazing researcher who invented some of the capabilities security professionals still…

  • Commanding the Trend: Social Media as Information Warfare

    This article demonstrates how social media is a tool for modern information-age warfare. It builds on analysis of three distinct topics: social networking, propaganda, and news and information sharing. Two case studies are used to show how state and non-state actors use social media to employ time-tested propaganda techniques to yield far-reaching results. The spread…

  • What did Cybersecurity and Cyberwar look like in 1999?

    Think all these news stories you are reading about cybersecurity, cyberwar, and cyberconflict are breaking new ground? It is worth taking a read through the several hundred entries meticulously compiled in Mich Kabay’s 1999 Infosec Year in Review which I recently found on an old drive while searching for other content. Some old new topics…

  • Trump: Accidental Nuclear Genius?

    Love him or hate him, when it comes to North Korea, Trump just may be frustratingly suited for nuclear negotiations. Unpredictability, emotional outbursts, irrationality, and other descriptors that have been applied to the sitting president are likely qualities a president should not have in general. According to Cold War-era nuclear deterrence theories, however, they may…

  • Best Security, Business, and Technology Books of 2017

    In looking at advances in technology over the past year, I’m reminded of the Lenin quote “There are decades where nothing happens; and there are weeks where decades happen.” It seems that to make the most sense of the top security and business trends you need to have a keen eye for advancements in AI,…

  • The 2017 Red Teamer’s Bookshelf

    “It’s been a couple of months since we first announced that Red Team Journal, Redteams.net, and OODALoop would be compiling the latest ‘Red Teamer’s Bookshelf’ jointly. For those of you who’ve been waiting, the list is finally here. It’s larger than previous years, so we’ve organized the titles by category (and yes, some of these…

  • Our Science Fiction Cyber Future

    “The cybersecurity industry is currently enamored with concepts of autonomous defense, including elements of machine learning, behavioral analytics, and artificial intelligence—and rightly so. Programed to be able to study all vulnerabilities in the public domain, autonomous bots (autbots)—not to be confused with bots simply conducting repetitive tasks like guessing default passwords as programmed—could take what…

  • Best Security, Business, and Technology Books of 2016

    Dozens of times per year, I get asked to recommend my favorite books so I couldn’t say no when the OODA Loop team asked me to build on Mark Mateski’s popular Red Teaming book list by providing my top 10 books for 2016. I have very eclectic interests, so I’ve focused my list on the…

  • Cyberterrorism and the role of Silicon Valley

    “As national security and war are being redefined for the digital age, Silicon Valley will need to be on the front line of counterterrorism. Its inventors and entrepreneurs are driving the information revolution, and they must figure out how to protect vital systems against malevolent intrusions. It lies at ground zero of the battle between government…


OODAcasts

  • Adam Shostack on Cybersecurity and What Every Engineer Should Learn From Star Wars

    Adam Shostack on Cybersecurity and What Every Engineer Should Learn From Star Wars

    Adam Shostack is widely known in the cybersecurity world for his pioneering work on disclosing and discussing computer vulnerabilities (the CVE  (common vulnerabilities and exposures) list). He also helped formalize and train leading approaches to threat modeling and wrote the foundational book on the subject (Threat Modeling: Designing for Security). In this OODAcast we seek…

  • Sebastian Mallaby on How Venture Capitalists and Hedge Funds Achieve Success

    Sebastian Mallaby on How Venture Capitalists and Hedge Funds Achieve Success

    Sebastian Mallaby joined the OODAcast for a discussion about the Power Law in venture capital and the rise of the global hedge fund and private equity industries.

  • Former Head of National Intelligence Council Neil Wiley on Intelligence Analysis

    Former Head of National Intelligence Council Neil Wiley on Intelligence Analysis

    Neil Wiley has lead some of the US Intelligence Community’s most important analytical functions. His career in intelligence began as a Naval Intelligence Officer in an operational intelligence center focused on support to critical operational naval missions. He would later serve joint intelligence missions in Europe, would rise to lead all analytical activities at the…

  • Michael Gibson Wants to Light the Paper Belt on Fire

    Michael Gibson Wants to Light the Paper Belt on Fire

    This OODAcast features a fascinating conversation with Michael Gibson, the author of the book “Paper Belt on Fire” who is also the co-founder of the Thiel Fellowship program and the 1517 Fund, both of which focus on identifying unconventional ideas and individuals that can drive disruptive innovation in technology, arts, and science.

  • Jimmy Soni on Why PayPal Was Successful
    ,

    Jimmy Soni on Why PayPal Was Successful

    In this OODAcast, we talk with Jimmy Soni, the author of the book “The Founders: The Story of PayPal and the Entrepreneurs Who Shaped Silicon Valley”. Jimmy takes a deep, historical look at the founding story of PayPal with detailed analysis, interviews, and access that you won’t find in any other telling of the PayPal…

  • Jen Hoar on Corporate Intelligence and Investigations

    Jen Hoar on Corporate Intelligence and Investigations

    In this OODAcast we interview one of our close friends and OODA network members, Jen Hoar. Jen is a former journalist-turned-corporate investigator who has leveraged the potent act of asking, and listening, to turn strangers into sources and contacts into clients. Her expertise, which is clearly also her passion, is identifying and interviewing smart people…

  • Joseph Menn on Observations From Tech Journalism
    ,

    Joseph Menn on Observations From Tech Journalism

    Covering technology issues, and specifically cybersecurity as a journalist is a tough endeavor. Some of these technologies are complex as are the security vulnerabilities often inherent in their deployment and making these topics broadly accessible can be a challenge. Many of the underlying issues touch upon national security and civil liberties creating an interesting nexus…

  • Lawrence Gasman on Assessing the Business Impact of Quantum Technologies

    Lawrence Gasman on Assessing the Business Impact of Quantum Technologies

    Lawrence Gasman has researched and reported on quantum technologies from the beginning of the discipline of quantum computing. He is now the President of Inside Quantum Technology (IQT), which provides in-depth business intelligence for the quantum technology industry. IQT also runs several major quantum technology conferences as well as a quantum industry news service. On…

  • 100 Episodes of OODAcast: Providing actionable insights for future risks and opportunities.

    100 Episodes of OODAcast: Providing actionable insights for future risks and opportunities.

    In 2020, we launched the OODAcast video and podcast series designed to provide insightful analysis and actionable intelligence to decision makers. In this 100th episode, co-hosts Matt Devost and Bob Gourley review some of the key insights from the series. Matt and Bob also discuss a OODA’s recent assessment of risks and opportunities given the…

  • David Greenberg on Decision-making in Volatile Markets

    While the OODA Loop was been heralded in the domain of conflict, we often find the concept in business and there is no greater business analogy to dogfighting that David Greenberg’s experience as a trader on the floor of the world’s largest physical commodities exchange. David’s job required rapid decision making based on constantly changing…

OODAcons