Start your day with intelligence. Get The OODA Daily Pulse.
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Once again, 2022 was marked by security professionals reacting to threats, incidents, and vulnerabilities of a previously unheard-of frequency, volume, and scale. For another year, cybersecurity efforts by the federal government in collaboration with corporate IT continued in earnest. We capture it all in this 2022 year-end review of cybersecurity.
If 2021 felt like an inflection point (as geopolitical strategy intersected with technology-driven innovation and tactics), 2022 was back to the future: technology is now the clear exponential driver of tactical maneuvers for military and geographic competitive advantage – all the while referencing nationalistic, technology-focused strategic blueprints. The goal? The strategic geopolitical and technological domination…
A chronological review of highlights from a difficult and busy year for the Federal Government, including the January 6th Committee proceedings and final report, mass shootings and climate crisis emergencies, and a busy and successful legislative agenda. Federal efforts in cybersecurity as well as critical infrastructure security and supply chain initiatives are also addressed in…
The following list is comprised of the Top 10 OODA Loop Original Analysis posts for 2022 as determined by the number of page views for each article. If you value our analysis, please consider a subscription (click here). One hundred percent of the subscription goes towards the curation of our popular Daily Intelligence Report and…
The following list is comprised of the Top 10 OODA Loop News Briefs of 2022 as determined by the number of page views for each article. If you value our analysis, please consider a subscription (click here). One hundred percent of the subscription goes towards the curation of our popular Daily Intelligence Report and original…
It has been another interesting and dynamic year on the security and intelligence front and OODA Loop was there to cover it all. The following list is comprised of the Top 10 Sensemaking and Member Resources Pages of 2022 as determined by the number of page views for each page. We also included posts that…
Recently, as part of their investigations into illegal wiretapping, Greek authorities raided an office of an Israeli company behind the Predator spyware, as well as five other companies believed to be connected in some capacity. The raids were the product of revelations of surveillance activities being conducted against dozens of prominent politicians, journalists, and businessmen,…
Following is a compilation of our 2022 series of posts on crypto and digital currency initiatives from around the globe, all of which are officially sanctioned to enhance national competitive advantage (in the event crypto overtakes the US dollar as the global reserve currency). The cumulative adoption rate of state-sanctioned crypto and digital currency legalization…
Cameron Over leads the Cyber & Privacy service line at CrossCountry Consulting. Cameron has extensive past performance in cybersecurity, including experience advising organizations with transforming their cybersecurity and privacy programs. Cameron has been in the field of information security since the late 90’s. From mid-high school, she was exposed to early network discovery techniques while…
In this episode of the OODAcast, Bob discusses the creative process and technology management approaches of Henry Harrison, CTO of Garrison Computing. Henry is a seasoned technology industry executive and serial entrepreneur who has spent the last ten years focused on cyber security both as an independent consultant and as Technical Director for Cyber Security at…
OODA CTO Bob Gourley was joined by Tony Cole of Attivo Networks in an interactive discussion on the state of cybersecurity, with a focus on how deception technologies can be leveraged by organizations of all sizes to mitigate risks. Tony is an icon in the cybersecurity community. He is known both as a practitioner and…