Start your day with intelligence. Get The OODA Daily Pulse.
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
In early March 2023, the 3rd meeting of the Republic of Korea-United States working group on the North Korean (DPRK) cyber threat met in Washington, D.C. Representatives included but were not limited to U.S. officials from the FBI, Justice, State, Treasury and South Korean officials from Ministry of Foreign Affairs and North Korean Nuclear Affairs. The group convened and…
Over the past several years, there has been a rapid emergence of companies, projects, and initiatives in what is broadly categorized as Web3. While monitoring that rapid innovation, the OODA research team has noticed a disproportionately high number of cybersecurity incidents that have the potential to negatively impact the Web3 innovation ecosystem, disrupt customer adoption…
The Defense Department’s Office of Strategic Capital has been ‘heads-down in assessing impacts to national security’ resulting from the collapse of Silicon Valley Bank, or SVB, according to an email Sunday from the OSC director.
Cameron Over leads the Cyber & Privacy service line at CrossCountry Consulting. Cameron has extensive past performance in cybersecurity, including experience advising organizations with transforming their cybersecurity and privacy programs. Cameron has been in the field of information security since the late 90’s. From mid-high school, she was exposed to early network discovery techniques while…
In this episode of the OODAcast, Bob discusses the creative process and technology management approaches of Henry Harrison, CTO of Garrison Computing. Henry is a seasoned technology industry executive and serial entrepreneur who has spent the last ten years focused on cyber security both as an independent consultant and as Technical Director for Cyber Security at…
OODA CTO Bob Gourley was joined by Tony Cole of Attivo Networks in an interactive discussion on the state of cybersecurity, with a focus on how deception technologies can be leveraged by organizations of all sizes to mitigate risks. Tony is an icon in the cybersecurity community. He is known both as a practitioner and…