Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Hackers break into Washington Post jobs site

    “Hackers broke into the Washington Post Co’s jobs website in two incidents last month, affecting more than a million user IDs and emails, the company said on its website.” (Source: Hackers break into Washington Post jobs site | Reuters.)

  • Epsilon security breach: 5 signs it’s only the tip of the iceberg – Mobile phones

    ” Targeted attacks are the trend in cyberspace. Six months ago, the world’s first cyber superweapon – Stuxnet – was discovered to be targeting Iran’s nuclear facilities. This week millions of e-mail addresses were reported stolen from Epsilon, a firm that supplies e-mail marketing to BestBuy, Disney, and many others. The two highlight a trend…

  • Cyber attacks outpace global response, U.S. warns

    “The technical sophistication of cybercriminals is swamping the world’s ability to cope, a top U.S. official warned on Friday, demanding an accelerated cross-border campaign to combat the security threat. “ (Source: Cyber attacks outpace global response, U.S. warns | Reuters.)

  • Security Researchers Discover the Mother of All Botnets

    “A new strain of the TDSS malware has been pegged as ‘the most sophisticated threat’ to computer security in the world today by a Kaspersky Labs researcher and is being used to slave more than 4.5 million PCs in a massive botnet that’s equipped with an ‘anti-virus’ to prevent other bot-creating viruses from taking it…

  • DOD wants contractors to safeguard unclassified info, report breaches

    “Federal contractors whose information systems contain unclassified Defense Department information would have to safeguard that information from unauthorized access and notify DOD of any breaches under a proposed rule published today.” (Source: DOD wants contractors to safeguard unclassified info, report breaches — Federal Computer Week.)

  • Biggest-ever criminal botnet links computers in more than 172 countries

    “Computer security experts say they have detected what appears to be the world’s largest-ever computer ‘botnet,’ a network of millions of computers controlled clandestinely by a criminal cyber gang with roots in Eastern Europe.” (Source: Biggest-ever criminal botnet links computers in more than 172 countries – CSMonitor.com.)

  • Cyber attack on Gannett targets U.S. soldiers

    “Hackers broke into a Gannett Co database containing personal information about subscribers to publications read by U.S. government officials, military leaders and rank-and-file soldiers, the media company said on Tuesday.” (Source: Cyber attack on Gannett targets U.S. soldiers – baltimoresun.com.)

  • Feds Identify Top 25 Software Vulnerabilities

    “Department of Homeland Security worked with non-profits and the private sector to come up with a list of the most worrisome threats and how organizations can mitigate them.” (Source: Feds Identify Top 25 Software Vulnerabilities — InformationWeek.)

  • Old worm won’t die after 2008 attack on U.S. military

    “Three years after what the Pentagon called the most significant breach of U.S. military networks ever, new versions of the malware blamed for the attack are still roiling U.S. networks, Reuters has learned.” (Source: Old worm won’t die after 2008 attack on U.S. military | Reuters.)

  • Pentagon’s advanced research arm tackles cyberspace

    “The Pentagon’s advanced research arm, the same group credited with developing the forerunner of the Internet in the 1960s, is working on many fronts to boost U.S. defenses against computer-generated attacks.” (Source: Pentagon’s advanced research arm tackles cyberspace | Reuters.)


OODAcasts

  • Kevin Roberts on Leadership, Decision-making, and Focused Action

    Kevin Roberts on Leadership, Decision-making, and Focused Action

    Kevin Roberts has had an illustrious career spanning many industries over numerous continents including serving as Chairman and CEO of Saatchi & Saatchi, one of the world’s leading creative organizations, where he had responsibility for the effectiveness of several of the world’s leading advertising budgets including for clients Toyota and Procter & Gamble. Today, his…

  • Michael Kanaan, Author of T-Minus AI Discusses Artificial Intelligence and Global Power
    ,

    Michael Kanaan, Author of T-Minus AI Discusses Artificial Intelligence and Global Power

    Michael Kanaan has helped a wide swath of decision-makers better grasp the nature of AI. He has a knack for expressing complex topics in clear, accurate and succinct ways and many of us in the national security community have already had the pleasure of hearing from him in person or in conferences. His book, T-Minus…

  • Jim Miller on Managing Policy in an Age of Constant Disruption and Dynamic Threats
    ,

    Jim Miller on Managing Policy in an Age of Constant Disruption and Dynamic Threats

    Jim Miller has worked for four decades on a combination of private and public sector initiatives focused on addressing a wide variety of national security threats.  He has held numerous positions within the Department of Defense including serving as Under Secretary of Defense for Policy and has been awarded the DoD’s highest civilian award four…

  • Chet Richards on John Boyd and applying OODA principles to the business world

    Chet Richards on John Boyd and applying OODA principles to the business world

    Chet Richards was a close associate of the late US Air Force Colonel John Boyd. He was there as the concept of the OODA Loop was being developed and constructed the first graphics of the OODA Loop from sketches Boyd drew. Chet is the author of the widely read business book “Certain to Win” which…

  • Courtney Bowman, Privacy and Civil Liberties Engineer, Palantir Technologies

    Courtney Bowman, Privacy and Civil Liberties Engineer, Palantir Technologies

    Courtney Bowman leads Palantir’s Privacy and Civil Liberties Engineering Team. In this capacity he works extensively with local, state and international governments and philanthropic partners to develop technology-driven solutions to information sharing needs that respect applicable privacy, security and data integrity requirements. He does so in a way that is informed by experience and well…

  • Kevin DeSanto On Due Diligence and M&A Transactions and Trust Based Networking

    Kevin DeSanto On Due Diligence and M&A Transactions and Trust Based Networking

    Kevin DeSanto is an investment banker delivering advice and execution assistance to high growth businesses preparing for M&A and financial transactions. His company, KippsDeSanto, has developed a reputation for trusted execution support for companies in government contracting, aerospace, defense and cybersecurity. He leads teams that advise senior management, boards of directors and shareholders. The art…

  • Bradley Rotter On The Future Of Work, CryptoCurrencies, Quantum Computing and Leadership

    Bradley Rotter On The Future Of Work, CryptoCurrencies, Quantum Computing and Leadership

    Bradley Rotter is a visionary investor who has pioneered investments in many new alternative investments classes including having been an early backer of hedge funds in 1982 while speculating on the Chicago Mercantile Exchange. He was also an early investor in Bitcoin and other cryptocurrency ecosystems and at a dinner with OODA CEO Matt Devost…

  • Andy Lustig On Legal and Due Diligence Support In The High Tech Era

    Andy Lustig On Legal and Due Diligence Support In The High Tech Era

    Andrew (Andy) Lustig is a partner at the high tech law firm Cooley, where he focuses on private equity investments, mergers and acquisitions and the general corporate representation of high-growth technology companies in both the commercial and government marketplace. His practice includes a wide range of industry sectors including information technology, national security, cybersecurity, data…

  • Paul Pagnato, CEO and Founder at PagnatoKarp  and Author of The Transparency Wave
    ,

    Paul Pagnato, CEO and Founder at PagnatoKarp and Author of The Transparency Wave

    Paul Pagnato migrated from a career as a scientist looking for life in outer space to one of the top financial advisors in the U.S. with a keen eye for tracking innovation, exponential change, and other emerging global issues. He is also the author of the recent book, The Transparency Wave, which highlights the essential…

  • Alsop-Louie Partner and Famed Tech Executive Bill Crowell on Technology Due Diligence
    ,

    Alsop-Louie Partner and Famed Tech Executive Bill Crowell on Technology Due Diligence

    Bill Crowell is a senior executive with extensive experience in government (rose to the level of Deputy Director of the National Security Agency) and in industry. He has been a CEO of leading companies like Cylink, taking them through growth to acquisition. He has been a director of multiple public and private companies with a…

OODAcons