The ransomware epidemic is starting to feel like one continuous incident report and a growing national security concern – not to mention the dormant “ghost in the machine” capabilities that have already been positioned in the U.S. internetwork (by nation-state and non-nation-state players alike) as part of a strategic plan for a larger act of…
In December 2023, the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Environmental Protection Agency (EPA), and the Israel National Cyber Directorate (INCD) issued an alert regarding the activities of Iranian cyber actors dubbed “CyberAv3ngers” believed to be tied to Iran’s Islamic Revolutionary Guard Corps (IRGC). The alert cited that this group…
Other industry sectors should keep a close eye on the critical milestones and pitfalls of the biotech/healthcare space – with an eye toward what platform, product, service innovations, and architectures may have a potable value proposition within your industry. The Stanford Institute for Human-Centered AI (HAI) is doing great work fielding research in healthcare with…
“Q-Day” is a scenario where “no more secrets” becomes a reality, as previously secure communications and data could be vulnerable to decryption by entities wielding quantum computational power (also known as “Quantum Supremacy”). Find a breakdown, analysis, and future scenarios here.
Regular readers of the OODA Loop know that we cover exponential technologies daily and we expect disproportionate disruption when these technologies start to converge. In this post, we explore AI + an expanded working definition (with subcategories) of what is broadly considered “the metaverse” + blockchain technology as an example of the exponential tech stack…
With Vladamir Putin’s “landslide” victory in the Russian Presidential election in the rearview mirror (the victory extends Putin’s autocratic rule through 2030, which will be his 18th year as president), we provide some situational awareness RE: Putin’s ongoing, global cyber and disinformation offensives – and the drone swarm attacks that are proving the 21st Century…
In this, the fifth installment in our “Dispatches from the Ministry for the Future” series, we take the time to do more of a deep dive into the speculative fiction/science fiction novel that inspired this eponymous series of posts – followed by details of the farmer protest that have broken out all over the EU…
Every year, we make a point of returning to a few social psychology, organizational behavior, and human behavioral psychology factors, namely how your organization should integrate the threat of human targeting and social engineering into your overall company culture and cybersecurity strategy. This post is an update from the frontlines – with recent offensive and defensive…
This is a review of what I see of the technology in the Ethereum ecosystem and some of the use cases it addresses today. It is designed to help leaders and decision-makers conceptualize what the functionality of Ethereum means for other technologies and for business operations (I look forward to discussions on this in our…
A new report from the Africa Center for Strategic Studies found that “disinformation campaigns seeking to manipulate African information systems have surged nearly fourfold since 2022, triggering destabilizing and antidemocratic consequences.” Find a summary and analysis of the report here.
OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation. Dan is also the author of the recently released book entitled “The Story of Technology”.