Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Top 10 Security, Technology, and Business Books of 2022

    Welcome to the 2022 edition of my top 10 books of the year list. This year, I’ve decided to split the fiction books into an additional category and given you two bonus books for your consideration written by close friends of mine.  With the launch of the Hack Factory this year, I’ve been very focused…

  • The Second Global Ransomware Meeting Much of the Same Thing

    The United States hosted a group of 37 nations and 13 global companies to discuss the problem of ransomware, as well as other cybercrime.  The meeting was a follow up to last year’s Counter-Ransomware Initiative (CRI), an informal gathering where nations reaffirmed their commitment to collaborating on the escalation of ransomware operations and voice common…

  • Strategic Plan for 2023-2025 Announced at 4th Meeting of the CISA Cybersecurity Advisory Committee

    The fourth meeting of the Cybersecurity and Infrastructure Security Agency (CISA) Cybersecurity Advisory Committee (CSAC) was held in September 2022. Opening remarks were addressed to the committee by Ms. Megan Tsuyi, CISA CSAC Designated Federal Officer, The Honorable Jen Easterly, Director, CISA, Mr. Tom Fanning, CSAC Chair, and Mr. Ron Green, CSAC Vice Chair. -…

  • Another Seminal Call to Action: Strengthening Innovation and Protecting the U.S. Technological Advantage

    Recent announcements by Razor’s Edge Ventures, America’s Frontier Fund, and the Quad Investor Network signal that the venture capital community is focusing its efforts on national security investment and American competitiveness – which has been formatively dubbed the “defense-related technologies” or “defense capabilities” sector. Others are calling it “Hacking for Defense”. On one level, the…

  • Breaking the Building Blocks of Hate: A Case Study of Minecraft Servers

    In yet another example of a successful public/private policy research collaboration and in a continuation of the topic discussed by Brian Jenkins at the OODA Network November Monthly Meeting – domestic political extremism – we turn to a report released in July of this year:  Breaking the Building Blocks of Hate: A Case Study of…

  • China Publishes Its Vision for Internet Harmony

    Recently, China published a white paper entitled “Jointly Build a Community with a Shared Future in Cyberspace”presenting its vision of creating an international community with a shared future in cyberspace. The document highlighted the successes of China’s Internet development and government practices over the past several years, and focused on key issues such as Internet…

  • CISA Releases Voluntary Cross-Sector Cybersecurity Performance Goals

    In July 2021, President Biden signed a National Security Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems. This memorandum required CISA, in coordination with the National Institute of Standards and Technology (NIST) and the interagency community, to develop baseline cybersecurity performance goals that are consistent across all critical infrastructure sectors. These voluntary cross-sector Cybersecurity Performance Goals…

  • The Rate of Learning in Threat Detection

    Historically, threat detection (e.g., rule-based intrusion detection, anti-virus systems, and threat intelligence feeds) has been reactive and involves flagging digital requests containing known signatures. These signatures are formalized post hoc, emanating from a compromise that has already happened and was then shared with others. Organizations have relied heavily on these tools—to their disadvantage. The figures…

  • Speculative Design: Welcome to Kaspersky’s Earth 2050

    As the 27th Conference of the Parties to the United Nations Framework Convention on Climate Change (COP27) meets in Sharm el-Sheikh, Egypt, we dedicate this installment of the Speculative Design Series to the future of the planet. Take a step into the future of the planet @ Kapersky’s Earth 2050.

  • Exponential Disruption and The Cyber Criminal Adoption of the InterPlanetary File System

    The InterPlanetary File System (IPFS) is an emerging Web3 technology that is currently seeing widespread abuse by threat actors. Cisco Talos has observed multiple ongoing campaigns that leverage the IPFS network to host their malware payloads and phishing kit infrastructure while facilitating other attacks. IPFS is often used for legitimate purposes, which makes it more…


OODAcasts

  • Bobbie Stempfley of Carnegie Mellon University Software Engineering Institute

    Bobbie Stempfley of Carnegie Mellon University Software Engineering Institute

    The leadership team at OODA have had the pleasure of working with and learning from Bobbie Stempfley since her leadership of the Department of Defense Computer Emergency Response Team (DoD CERT) after she established it in the late 1990’s. This OODAcast captures insights from Bobbie that can inform the action of leadership of corporate and…

  • Marc Ambinder of USC Annenberg School For Communication and Journalism

    Marc Ambinder of USC Annenberg School For Communication and Journalism

    Marc Ambinder is a journalist, researcher, historian, author of bestselling books and a teacher/mentor to many. We invited him on the OODAcast to help our community as we continue to look for insights that can drive operational decisions. For 20 years, Marc Ambinder has told true and complex stories about the world, revealed some of its…

  • Peter Singer on Burn-In
    ,

    Peter Singer on Burn-In

    Burn-In is anchored in the realities we see all around us today. Artificial Intelligence is coming fast and changing the nature of many jobs, robots and automation are bringing tremendous new capabilities but also threatening humanity with loss of employment opportunities. Parenting in a world where everyone, including kids, are always connected is already changing…

  • Congressman Will Hurd on AI, 5G, Cybersecurity Risk and Geopolitical Risk
    ,

    Congressman Will Hurd on AI, 5G, Cybersecurity Risk and Geopolitical Risk

    In this OODAcast, OODA LLC CEO Matt Devost interviews Congressman Will Hurd in a wide ranging discussion that touches on issues of geopolitical risk, cybersecurity, cyber risk and ways to help ensure our nation is prepared to compete and win in an age of rapid technological innovation. Quantum Computing, Artificial Intelligence, Advanced Communications (5G) and…

  • Robert Fink of Palantir on Lessons Learned From Using Data In Crisis Response

    Robert Fink of Palantir on Lessons Learned From Using Data In Crisis Response

    Robert Fink is on the leadership team at Palantir, where he has helped shape their approach to product design and architecture. He has also played major roles in ensuring the company stays focused on the mission needs of customers today, and, through shaping R&D, is helping ensure the company is better able to serve the…

  • JC Raby On Creating Value in Disruptive Markets

    JC Raby On Creating Value in Disruptive Markets

    We invited Boston Merdian’s co-founder and partner JC Raby on to the OODAcast do discuss his insights into the market today as well as his views on things companies can do to ensure they position themselves for the best possible transaction in the future. We also asked his advice for the strategic investor/buyer of firms…

  • Renowned Business Executive Scott McNealy, Co-Founder of Sun Microsystems, On Leadership

    Renowned Business Executive Scott McNealy, Co-Founder of Sun Microsystems, On Leadership

    Scott McNealy was a co-founder and CEO of Sun Microsystems and has one of the longest-running tenures as the CEO of a Fortune 500 company in history. He was one of the few businessmen that played a critical role in the emergence of the Silicon Valley technology industry that exists today and is a highly…

  • CEO of Percipient Balan Ayyar on the OODA Loop in Business

    CEO of Percipient Balan Ayyar on the OODA Loop in Business

    Balan Ayyar is the Founder and CEO of Percipient.ai, a Silicon Valley based artificial intelligence firm focused on delivering products and solutions for the most pressing intelligence and national security challenges. We have been tracking this leader for years and have watched him inspire many to achieve great things. His leadership in senior officer roles…

  • Expert Practitioner of Analysis Carmen Medina on Mental Models and Cognitive Bias

    Expert Practitioner of Analysis Carmen Medina on Mental Models and Cognitive Bias

    Carmen Medina served 32 years in senior positions at the Central Intelligence Agency, most of which focused on one of the hardest tasks in the community, that of analysis. Carmen rose to lead the strategic assessments group for the agency, then was deputy director of intelligence, the most senior leadership position for analysis at the…

  • Lou Manousos, CEO of RiskIQ, On Reducing Adversary Attack Paths

    Lou Manousos, CEO of RiskIQ, On Reducing Adversary Attack Paths

    Elias (Lou) Manousos is a recognized expert in Internet security and fraud prevention. He has been developing and delivering enterprise protection technologies for more than 15 years. As CEO of RiskIQ, he has spearheaded a new approach that helps Internet, financial services, healthcare, media and consumer packaged goods companies protect their brands from online fraud.…

OODAcons