Welcome to 8th edition of my annual top 10 books list! Each year, I read close to 100 books and distill down my 10 favorite security, technology and business books into this top 10 list and also include my favorite fiction books of year and a handful of honorable mentions that didn’t make the top…
China’s cyber operations have grown into sophisticated campaigns targeting critical infrastructure. The hacking group Volt Typhoon, operating under Beijing’s directives, infiltrated U.S. internet providers, gaining access to systems essential to our national security.
This just got serious. This is not just an intrusion or malware or an implant for future use. This is total compromise of all major telecommunications firms.
What cyber policies the new cyber team will implement remains a question, but there may be some indication of what will come to pass based on what was observed during Trump’s first term, and his views on what needs to be done in cyberspace.
The 2024 report, “Artificial Intelligence and the Future of Work,” published by the National Academies of Sciences, Engineering, and Medicine, provides a detailed examination of the evolving implications of AI on productivity, workforce dynamics, and education.
U.S. policymakers are evaluating the creation of a Strategic Bitcoin Reserve. So too are U.S. States and international entities – all signs of a broader global trend of integrating digital assets into public finance strategies.
The Arctic’s rapid transformation presents both challenges and opportunities for the United States. A recent CRS report highlights key issues shaping U.S. policy – emphasizing the need for strategic, coordinated responses.
Sweden’s modern psychological defense principles offer a robust framework to counter foreign information manipulation, safeguard democratic systems, and fortify public trust – what we call “Cognitive Infrastructure.”
Drone swarms like these are a testament to human ingenuity, designed for entertainment, logistics, or search-and-rescue operations. But their dual-use nature—the potential to be adapted for military applications—is impossible to ignore.
OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation. Dan is also the author of the recently released book entitled “The Story of Technology”.