Our recent coverage of commercial space has included DoD efforts to leverage the commercial space internet as “future military operations will be multi-domain and will be conducted with unprecedented …
Global Drought Conditions and Food Security: Follow the Fertilizer
These days, you never know where the next strategic metric will emerge. As OODA CEO wrote in the OODA Alamanac 2022: "In 2022 our national decision-making apparatus will be significantly stressed …
Continue Reading about Global Drought Conditions and Food Security: Follow the Fertilizer
Blockchain-enabled Digital Self-Sovereignty – Patients will be Able to Sell Healthcare Data via Blockchain-based Exchange
While cryptocurrency and blockchain technologies are not official exponential technologies, they are exponential-adjacent. Why? As we shared in our recent post "By Design, The Quantum List Companies …
By Design, The Quantum List Companies are Strategically Structured for Exponential Speed and Scale
In 2015 and 2016, the technology sector was in a full-blown artificial intelligence "Arms Race." At that point, it was anyone's game, and the leading technology companies were in a merger and …
Making the Metaverse Safe For Everyone
Unlike any other time in history, the past decade has shown us the power of technology to transform our working and personal lives. Technology-enabled shopping, banking and working from any location …
Continue Reading about Making the Metaverse Safe For Everyone
Large-scale Crypto Heists and Ransomware Attacks are not the only Cybercrime Trends and Statistics
While cryptocurrency heists and ransomware attacks dominate the headlines (due to their sheer volume and scale), other types of cybercrime have grown in alarming ways as well. AtlasVPN recently …
The Cyber Threat Vector as Food and Agriculture Industry Sector Heads into Critical Seasons
We continue with our research and analysis of the food and agriculture (FA) sector and the cyber threat vector as agriculture and food systems and cyber risk have become a central driving force and …
The Ronin DeFi Network Hack and Blockchain Analysis Techniques for Attribution
In early April, we began our research and analysis of crypto and blockchain security initiatives which, in the case of OODA Loop, begins with tracking down the best-in-class research efforts and …
PIPL, DSL, CSL – China Forges a Legal Path to Cyber Sovereignty
On November 1, 2021, China’s “Personal Information Protection Law” (PIPL) went into effect. The PIPL protects the personal privacy of Chinese citizens, and perhaps more importantly, mandates that …
Continue Reading about PIPL, DSL, CSL – China Forges a Legal Path to Cyber Sovereignty
Reshoring U.S. Manufacturing, Security Researcher Protections, and Open Source Security Topics of May 2022 OODA Network Member Meeting
To help members optimize opportunities and reduce risk, OODA hosts a monthly video call to discuss items of common interest to our membership. These highly collaborative sessions are always a great …