Start your day with intelligence. Get The OODA Daily Pulse.
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
From LGF: Search Engine: Google – Search Term: Tiananmen What the Chinese see What the rest of the world sees
Yeah, get some! You might not agree with their positions, but you can’t argue with the quality of their content.
They’re coming to take the waters: Mexican federal agents have arrested four Iraqis trying to sneak into the United States without proper documents, the government said Monday. […] Many undocumented Iraqi nationals have been captured in Mexico en route to the U.S. border. None has been found to have had any links to terrorism.
William Arkin points out an interesting set of coincidences: The National Security Agency is in the process of building a new warning hub and data warehouse in the Denver area, realigning much of its workforce from Ft. Meade, Maryland to Colorado. On the surface, the NSA move seems to be a management and cost cutting…
Reuters opens the back door (draft) – (thanks E.D.): The U.S. Army has forced about 50,000 soldiers to continue serving after their voluntary stints ended under a policy called “stop-loss,” but while some dispute its fairness, court challenges have fallen flat. The policy applies to soldiers in units due to deploy for the…
DOJ PAO explains what all the fuss is about.
My Weekly Standard article is up. Thanks Steve, R, C, and of course WK. Pre-emptive note to the CF community: Yes, if this were going to the IJDE it would read a lot differently. Consider who the average WS reader is. I’m on the HTCIA listserv if you want to discuss technology/technique.
I spent a brief but memorable time in West Texas many years ago. Unlike a lot of my cohorts I never made a weekend trip south of the border; in part because I’m not all that interested in donkey shows, and because I had a bad experience with tequila once that haunts me to this…
In case I needed to paint a bolder and more colorful picture of what one can find on captured media . . . from crypto/privacy guru Bruce Schneier in Wired: Some years ago, I left my laptop computer on a train from Washington to New York. Replacing the computer was expensive, but at the…
Computerworld’s EiC weighs in on a COMPUSEC issue: Computerworld‘s Jaikumar Vijayan reported that the DHS is spending $1.24 million on a project designed to improve the security of open-source software (“DHS Funds Effort to Find Flaws in Open-source,” Jan. 16). The money is being paid to Stanford University, Symantec and source-code analysis vendor Coverity to…
Cameron Over leads the Cyber & Privacy service line at CrossCountry Consulting. Cameron has extensive past performance in cybersecurity, including experience advising organizations with transforming their cybersecurity and privacy programs. Cameron has been in the field of information security since the late 90’s. From mid-high school, she was exposed to early network discovery techniques while…
In this episode of the OODAcast, Bob discusses the creative process and technology management approaches of Henry Harrison, CTO of Garrison Computing. Henry is a seasoned technology industry executive and serial entrepreneur who has spent the last ten years focused on cyber security both as an independent consultant and as Technical Director for Cyber Security at…
OODA CTO Bob Gourley was joined by Tony Cole of Attivo Networks in an interactive discussion on the state of cybersecurity, with a focus on how deception technologies can be leveraged by organizations of all sizes to mitigate risks. Tony is an icon in the cybersecurity community. He is known both as a practitioner and…