Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Cyber security: EU and US strengthen transatlantic cooperation in face of mounting global cyber-security and cyber-crime threats

    “Today, as part of the EU-US Justice and Home Affairs Ministerial in Gödöllo (Hungary), Neelie Kroes, European Commission Vice President for the Digital Agenda, EU Home Affairs Commissioner Cecilia Malmström and Secretary of the US Department of Homeland Security Janet Napolitano reiterated their shared commitment to deepening cooperation to address the increasing threats to global…

  • FBI uncovers string of large, unauthorized wire transfers to China

    “The FBI has sent out a fraud alert over recent trend of unauthorized wire transfers to China. Small- to medium-sized business in the U.S. are typical victims.” (Source: FBI uncovers string of large, unauthorized wire transfers to China.)

  • The Definitive Story About the Most Sophisticated Cyberattack in History

    “The story of Stuxnet, a piece of malware that almost certainly targeted an Iranian nuclear facility, is complex and dense. Most of the interesting stuff is buried in the half megabyte of code that the worm is made of, and telling a good story about the details is nearly as difficult as figuring them out…

  • Reports: DHS, IRS Databases At Risk

    “Some of the federal government’s most critical agencies are falling down on database security with misconfigurations, vulnerabilities, and a lack of best practices, putting sensitive citizen and defense information at risk as a result, new government audits show. Just this week, the Office of the Inspector General (IG) found that the Department of Homeland Security…

  • AntiSec Hackers Hit F.B.I. Contractor

    “Hackers who have claimed responsibility for a spate of recent break-ins said on Friday that they had infiltrated the network of IRC Federal, an engineering contractor that works for federal agencies including the Federal Bureau of Investigation, and stole internal documents from its database and e-mail system.” (Source: AntiSec Hackers Hit F.B.I. Contractor – NYTimes.com.)

  • U.S. infrastructure faces cyberthreats

    “The Obama administration is working to contain cybersecurity threats posed by software and hardware infrastructure built overseas, an official said Thursday.” (Source: U.S. infrastructure faces cyberthreats – UPI.com.)

  • Hackers break into Washington Post jobs site

    “Hackers broke into the Washington Post Co’s jobs website in two incidents last month, affecting more than a million user IDs and emails, the company said on its website.” (Source: Hackers break into Washington Post jobs site | Reuters.)

  • Epsilon security breach: 5 signs it’s only the tip of the iceberg – Mobile phones

    ” Targeted attacks are the trend in cyberspace. Six months ago, the world’s first cyber superweapon – Stuxnet – was discovered to be targeting Iran’s nuclear facilities. This week millions of e-mail addresses were reported stolen from Epsilon, a firm that supplies e-mail marketing to BestBuy, Disney, and many others. The two highlight a trend…

  • Cyber attacks outpace global response, U.S. warns

    “The technical sophistication of cybercriminals is swamping the world’s ability to cope, a top U.S. official warned on Friday, demanding an accelerated cross-border campaign to combat the security threat. “ (Source: Cyber attacks outpace global response, U.S. warns | Reuters.)

  • Security Researchers Discover the Mother of All Botnets

    “A new strain of the TDSS malware has been pegged as ‘the most sophisticated threat’ to computer security in the world today by a Kaspersky Labs researcher and is being used to slave more than 4.5 million PCs in a massive botnet that’s equipped with an ‘anti-virus’ to prevent other bot-creating viruses from taking it…


OODAcasts

  • Adam Shostack on Cybersecurity and What Every Engineer Should Learn From Star Wars

    Adam Shostack on Cybersecurity and What Every Engineer Should Learn From Star Wars

    Adam Shostack is widely known in the cybersecurity world for his pioneering work on disclosing and discussing computer vulnerabilities (the CVE  (common vulnerabilities and exposures) list). He also helped formalize and train leading approaches to threat modeling and wrote the foundational book on the subject (Threat Modeling: Designing for Security). In this OODAcast we seek…

  • Sebastian Mallaby on How Venture Capitalists and Hedge Funds Achieve Success

    Sebastian Mallaby on How Venture Capitalists and Hedge Funds Achieve Success

    Sebastian Mallaby joined the OODAcast for a discussion about the Power Law in venture capital and the rise of the global hedge fund and private equity industries.

  • Former Head of National Intelligence Council Neil Wiley on Intelligence Analysis

    Former Head of National Intelligence Council Neil Wiley on Intelligence Analysis

    Neil Wiley has lead some of the US Intelligence Community’s most important analytical functions. His career in intelligence began as a Naval Intelligence Officer in an operational intelligence center focused on support to critical operational naval missions. He would later serve joint intelligence missions in Europe, would rise to lead all analytical activities at the…

  • Michael Gibson Wants to Light the Paper Belt on Fire

    Michael Gibson Wants to Light the Paper Belt on Fire

    This OODAcast features a fascinating conversation with Michael Gibson, the author of the book “Paper Belt on Fire” who is also the co-founder of the Thiel Fellowship program and the 1517 Fund, both of which focus on identifying unconventional ideas and individuals that can drive disruptive innovation in technology, arts, and science.

  • Jimmy Soni on Why PayPal Was Successful
    ,

    Jimmy Soni on Why PayPal Was Successful

    In this OODAcast, we talk with Jimmy Soni, the author of the book “The Founders: The Story of PayPal and the Entrepreneurs Who Shaped Silicon Valley”. Jimmy takes a deep, historical look at the founding story of PayPal with detailed analysis, interviews, and access that you won’t find in any other telling of the PayPal…

  • Jen Hoar on Corporate Intelligence and Investigations

    Jen Hoar on Corporate Intelligence and Investigations

    In this OODAcast we interview one of our close friends and OODA network members, Jen Hoar. Jen is a former journalist-turned-corporate investigator who has leveraged the potent act of asking, and listening, to turn strangers into sources and contacts into clients. Her expertise, which is clearly also her passion, is identifying and interviewing smart people…

  • Joseph Menn on Observations From Tech Journalism
    ,

    Joseph Menn on Observations From Tech Journalism

    Covering technology issues, and specifically cybersecurity as a journalist is a tough endeavor. Some of these technologies are complex as are the security vulnerabilities often inherent in their deployment and making these topics broadly accessible can be a challenge. Many of the underlying issues touch upon national security and civil liberties creating an interesting nexus…

  • Lawrence Gasman on Assessing the Business Impact of Quantum Technologies

    Lawrence Gasman on Assessing the Business Impact of Quantum Technologies

    Lawrence Gasman has researched and reported on quantum technologies from the beginning of the discipline of quantum computing. He is now the President of Inside Quantum Technology (IQT), which provides in-depth business intelligence for the quantum technology industry. IQT also runs several major quantum technology conferences as well as a quantum industry news service. On…

  • 100 Episodes of OODAcast: Providing actionable insights for future risks and opportunities.

    100 Episodes of OODAcast: Providing actionable insights for future risks and opportunities.

    In 2020, we launched the OODAcast video and podcast series designed to provide insightful analysis and actionable intelligence to decision makers. In this 100th episode, co-hosts Matt Devost and Bob Gourley review some of the key insights from the series. Matt and Bob also discuss a OODA’s recent assessment of risks and opportunities given the…

  • David Greenberg on Decision-making in Volatile Markets

    While the OODA Loop was been heralded in the domain of conflict, we often find the concept in business and there is no greater business analogy to dogfighting that David Greenberg’s experience as a trader on the floor of the world’s largest physical commodities exchange. David’s job required rapid decision making based on constantly changing…

OODAcons