Start your day with intelligence. Get The OODA Daily Pulse.
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
“Hackers broke into a Gannett Co database containing personal information about subscribers to publications read by U.S. government officials, military leaders and rank-and-file soldiers, the media company said on Tuesday.” (Source: Cyber attack on Gannett targets U.S. soldiers – baltimoresun.com.)
“Department of Homeland Security worked with non-profits and the private sector to come up with a list of the most worrisome threats and how organizations can mitigate them.” (Source: Feds Identify Top 25 Software Vulnerabilities — InformationWeek.)
“Three years after what the Pentagon called the most significant breach of U.S. military networks ever, new versions of the malware blamed for the attack are still roiling U.S. networks, Reuters has learned.” (Source: Old worm won’t die after 2008 attack on U.S. military | Reuters.)
“The Pentagon’s advanced research arm, the same group credited with developing the forerunner of the Internet in the 1960s, is working on many fronts to boost U.S. defenses against computer-generated attacks.” (Source: Pentagon’s advanced research arm tackles cyberspace | Reuters.)
The National Memorial Institute for the Prevention of Terrorism (MIPT) in Oklahoma City focuses on “preventing and deterring terrorism or mitigating its effects.” Since April 2001, MIPT has funded Project Responder, an effort by Hicks & Associates, Inc. and the Terrorism Research Center, Inc., aimed ultimately at improving local, state and federal emergency responders’ capabilities…
This paper explores methods for capitalizing on existing law enforcement intelligence capabilities to provide intelligence support to decision makers for a full spectrum of public safety and emergency service operations. Intelligence-led mitigation is a management philosophy and business process to proactively guide strategic, operational, and tactical decisions for mitigating the effects of intentional, accidental, and…
“What good did social media actually do for the people of Iran?” TechCrunch‘s Paul Carr asks. “Despite a slew of YouTube videos and a couple of thousand foreign Twitter users turning their avatar green and pretending to be in Tehran, Mahmoud Ahmadinejad is still in power.” While harsh, this criticism is essentially correct. New technologies,…
In the finger-pointing-fest after 9/11, the US Intelligence Community was blamed for failing to “connect the dots.” As incomplete a description of the intelligence analysis process as that may be, it brought to the fore a point that many of us in the business had been complaining about for years: stovepipes and parochial interests inhibited…
Masha Sedova is an award-winning people-security expert, speaker, and entrepreneur focused on helping companies transform employees from a risk into a key element of defense. She has been a part of our OODA Network for years, including speaking at our legacy FedCyber event, where she introduced the behavior-based and gamified cybersecurity training and awareness she…
Paul Kurtz is an internationally recognized expert on cybersecurity and the Co-Founder and Chairman of TruSTAR. In this OODAcast we dive into Paul’s views on the cybersecurity landscape today and learn more about his approach to decision-making. We discuss a new concept he has been shepherding in the community regarding how cyber intelligence can be…