Start your day with intelligence. Get The OODA Daily Pulse.
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Following the initial discussion at the April 2024 OODA Network Monthly Meeting of Domain-Specific Large Language Model Development and Use Cases, the conversation transitioned into technology topics, underscoring the need to stay informed about rapidly advancing tech domains, in a discussion of a broad swath of exponential technologies in the context of the current global…
Future scenarios involving the Recoding of War Doctrine and the Disintermediation of the Theater of Operation by the Swarm Architecture are transformative, heralding a shift in the very fabric of military strategy and operations. While still evolving, these concepts suggest a future where warfare is increasingly dominated by autonomous systems and decentralized decision-making, fundamentally altering…
At the RSA cybersecurity conference, the Secretary of State announced the release of the Department’s new International Cyberspace & Digital Policy Strategy whose four goals are to advance economic prosperity; enhance security and address cybercrime; promote human rights, democracy, and the rule of law; and other transnational challenges.
Masha Sedova is an award-winning people-security expert, speaker, and entrepreneur focused on helping companies transform employees from a risk into a key element of defense. She has been a part of our OODA Network for years, including speaking at our legacy FedCyber event, where she introduced the behavior-based and gamified cybersecurity training and awareness she…
Paul Kurtz is an internationally recognized expert on cybersecurity and the Co-Founder and Chairman of TruSTAR. In this OODAcast we dive into Paul’s views on the cybersecurity landscape today and learn more about his approach to decision-making. We discuss a new concept he has been shepherding in the community regarding how cyber intelligence can be…