Start your day with intelligence. Get The OODA Daily Pulse.
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
On Friday, August 17, three members of a Russian feminist punk rock band were sentenced to two years in prison for singing an anti-Putin song at Moscow’s Cathedral of Christ the Savior. They were found guilty of hooliganism and religious hatred against the Russian Orthodox Church, though the verdict was transparently a message for other opposition protesters. Since the band’s arrest,…
Federal Cyber Security professionals have long considered the “insider threat” as the most insidious, hardest to protect against threat vector. This has always been the toughest form of threat, even before computers were created. Now that every employee in the entire organization must have access to IT the cyber version of this threat is just…
“Secretary of State Hillary Rodham Clinton says U.S. cyber experts hacked al-Qaeda propaganda online in Yemen, changing ads that bragged about killing Americans into ads that showed the death toll of al-Qaeda attacks against Yemenis.” (Clinton: U.S. hacked Yemeni al-Qaeda sites – USATODAY.com)
“A major cyber attack is currently underway aimed squarely at computer networks belonging to US natural gas pipeline companies, according to alerts issued by the US Department of Homeland Security.” (Alert: Major cyber attack aimed at natural gas pipeline companies – CSMonitor.com)
“The cleverly crafted missive included a link to a malicious webpage, where workers could get information about employee benefits. But instead of getting facts about a health plan or retirement fund, workers who visited the site using Internet Explorer got bit with malicious code that downloaded silently to their machines.” (Everyone Has Been Hacked. Now…
“Internet-based social networking sites have created a revolution in social connectivity. However, con artists, criminals, and other dishonest actors are exploiting this capability for nefarious purposes. There are primarily two tactics used to exploit online social networks. In practice, they are often combined. 1. Computer savvy hackers who specialize in writing and manipulating computer code…
We are in the planning stages of OODAcon 2025, which will be held 29 October 2025 at the Hyatt Regency Reston. For an overview of last year’s OODAcon see: OODAcon 2024 Welcome to OODAcon 2025
OODAcon 2023 October 25th – Reston, VA The anticipation of disruptive technologies has allure for those of us trying to develop informed strategies about the future, but what if those disruptive technologies already exist today? Our theme for this year’s OODAcon is FUTURE NOW as we focus on the technologies, ideas, and risks that exist right now…
The conference will feature an impressive lineup of speakers—pioneers who are steering the direction of their respective fields towards a unified vision of the future. OODAcon 2024 is your arena to witness, participate, and contribute to the dialogue that drives innovation forward. Join us in hacking the future, together, as we navigate the complexities of…