Start your day with intelligence. Get The OODA Daily Pulse.
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Recently, as part of their investigations into illegal wiretapping, Greek authorities raided an office of an Israeli company behind the Predator spyware, as well as five other companies believed to be connected in some capacity. The raids were the product of revelations of surveillance activities being conducted against dozens of prominent politicians, journalists, and businessmen,…
Following is a compilation of our 2022 series of posts on crypto and digital currency initiatives from around the globe, all of which are officially sanctioned to enhance national competitive advantage (in the event crypto overtakes the US dollar as the global reserve currency). The cumulative adoption rate of state-sanctioned crypto and digital currency legalization…
The Quantum Cybersecurity Preparedness Act passed the Senate last week (on Friday, December 16th) and is ready for the President’s signature. The bill is an outgrowth of National Security Memorandum 8 (NSM8): “Improving the Cybersecurity of National Security, Department of Defense and Intelligence Community Systems”. NSM8 appeared to have been inspired by Project Warp Speed…
Masha Sedova is an award-winning people-security expert, speaker, and entrepreneur focused on helping companies transform employees from a risk into a key element of defense. She has been a part of our OODA Network for years, including speaking at our legacy FedCyber event, where she introduced the behavior-based and gamified cybersecurity training and awareness she…
Paul Kurtz is an internationally recognized expert on cybersecurity and the Co-Founder and Chairman of TruSTAR. In this OODAcast we dive into Paul’s views on the cybersecurity landscape today and learn more about his approach to decision-making. We discuss a new concept he has been shepherding in the community regarding how cyber intelligence can be…