This page serves as a dynamic resource for OODA Network members looking for Quantum Computing, Quantum Security and Quantum Sensing insights to drive their decision-making process.
-
Uncut Gem – A fully open-source, hackable quantum sensor – signals a shift from closed, lab-bound quantum systems toward modular, inspectable, and community-driven quantum infrastructure.
-
As the earliest large-scale adopter of AI, healthcare demonstrated the promise and peril of accelerated innovation—revealing where algorithmic tools deliver breakthroughs and where they generate unacceptable risk.
-
China’s National Internet ID: Increased Control and Strategic Competition In the evolving cyber competition between great powers, technological shifts often lead geopolitical realignment. China’s latest policy initiative called the National Network Identity Authentication system (aka, Internet ID) is not just a data security reform; it represents a strategic readjustment of how a nation state manages…
-
Applying AI inside a complex enterprise is not an academic exercise or a vendor demo; it is hard, operational work that succeeds or fails in the real world of customers, regulators, boards, and bottom lines. This guide is written from that front line. It distills lessons from practitioners who have spent years helping enterprises design,…
-
The U.S. capture of Venezuela’s illegitimate, de facto president in a surprise joint law enforcement and military operation marks a decisive break from decades of Western Hemisphere restraint.
-
In 2025, geopolitical risk and technology ceased to be parallel domains. They fused into a single acceleration dynamic – compressing decision timelines and raising the cost of strategic hesitation.
-
Across 2025, cybersecurity evolved from a domain of incident response into a core arena of geopolitical competition, AI acceleration, and systemic risk.
-
A year-end review, organized by major themes as well as recaps of monthly federal activity over the course of 2025.
-
In her most recent essay for Foreign Affairs, the former CISA Director argues that insecure code and poor design drive persistent vulnerabilities, and that artificial intelligence (AI) offers the only realistic path to systemic resilience.
-
MissionLink has announced the graduates of its 2025 Cohort, spotlighting a group of dual-use technology companies positioned at the intersection of innovation and national security. Spanning AI, cyber defense, data intelligence, space, and emerging technologies, the cohort underscores the growing role of private-sector innovation in addressing mission-critical challenges.
-
Cryptocurrency has crossed a strategic threshold: what began as a speculative financial innovation has accelerated into a contested/persistent system shaping cybercrime, sanctions evasion, statecraft, financial enforcement, and global monetary competition.
-
This compilation brings together videos and session summaries from OODAcon 2025, pairing concise takeaways with visual capture of the ideas that define the next phase of technological acceleration.
-
Energy has become the limiting factor for technological acceleration: no longer a background constraint. Energy is rapidly becoming the primary strategic asset shaping AI, national security, industrial competitiveness, and geopolitical alignment.
-
Weaponizing the Private Sector: A Cautionary Tale for Private Sector Risk and Global Norms By now, it’s clear that the incoming cyber strategy crafted under President Donald Trump is poised to reshape not just how the United States defends its networks, but how it engages in cyberspace offensively, strategically, and institutionally. But beneath the rhetorical…
-
India has officially released a comprehensive national strategy, “Transforming India Into a Leading Quantum-Powered Economy: Vision 2035”, that aims to make the country one of the top three global quantum powers by 2035.
-
A new wave of U.S./U.K. sanctions and a global joint advisory on operational technology (OT) risks underscore a rapidly escalating campaign by pro-Russia hacktivist groups targeting critical infrastructure worldwide.
-
OODA Network Member Bill Vass (Booz Allen Chief Technology Officer) and Booz Allen SVP Munjeet Singh showed how physical AI, digital proving grounds, and agentic autonomy are converging to reshape real-world robotics, test ranges, and national-security missions.
-
At OODAcon 2025, former CIA Directorate of Science and Technology chief Dawn Meyerriecks delivered a blunt warning: America’s strategic advantage will not come from scale, but from adaptability – and the nation is losing ground on talent, industrial capacity, and economic security faster than policymakers realize.
-
OODA network members have access to an extensive repository of research and analysis on the impact of technology on geopolitics, business strategy and cybersecurity. This human generated, expert vetted information created to inform decisions of our membership, and has always been available by both search and topical categorization. These insights now form the foundation of…
-
This OODAcon 2025 session convened an all-star panel of national security technologists to examine how AI, automation, and space systems are reshaping the modernization of the U.S. military.
-
We continue to track the insights of Nate Fick (now in his “post-State Department Era”}. In November, we caught up with him as he moderated a panel at the 2025 Aspen Cyber Summit in Washington, D.C entitled “Strategic Frontlines: Cyber Policy in the Asia-Pacific”.
-
Welcome to 9th edition of my annual top 10 books list! Each year, I read close to 100 books and distill down my 10 favorite security, technology and business books into this top 10 list and also include my favorite fiction books of year and a handful of honorable mentions that didn’t make the top…
-
Do Tariffs Solicit Cyber Attention? Escalating Risk in a Fractured Supply Chain Regardless of criticisms of tariff imposition as a tool of foreign policy, it is clear that the United States’ use of them is viewed by the Administration as a way of righting scales in a variety of areas, to include revenue generation; job/manufacturing…
-
Hacker-turned-concert pianist Serene makes the case that the fight for internet freedom is no longer just a technical challenge – it’s a cultural, political, and human one. Archived video an expanded analysis of her OODAcon 2025 conversation with OODA CEO Matt Devost can be found here.
-
Every year we gather a select group of business and government leaders at OODAcon, where we provide insights into defining issues shaping strategy and decision-making in this age of exponential technologies. It was also the perfect opportunity to reflect on a key topic which has been discussed for years in the OODA network: How should…
-
AI’s diffusion is now inseparable from its compute infrastructure. 2025 marks the year when nations and hyperscalers began measuring, monetizing, and governing “AI compute” as a strategic asset, linking sovereign cloud capacity, public-private infrastructure build-outs, and the spread of AI capabilities across sectors and economies.
-
At OODAcon 2025, hardware transparency took center stage as Allan Friedman introduced the Hardware Bill of Materials (HBOM) as the next critical pillar of national resilience. The archived video and an expanded summary of the discussion are available here.
-
China’s 2026 Cybersecurity Law Amendments: A Risk for U.S. Organizations The new amendments to China’s Cybersecurity Law (CSL), set to take effect on January 1, 2026, should register as a notable shift. The old CSL, which went into effect June 2017, laid a foundation for network operation security, data localization, and critical infrastructure protection for…
-
In my recent invited Congressional expert witness testimony before the U.S. House Judiciary Committee’s Subcommittee on Courts, Intellectual Property, Artificial Intelligence, and the Internet, I emphasized that the United States is experiencing multiple simultaneous tech revolutions beyond just AI. As we navigate advances in space tech, biotech, quantum tech, and the miniaturization of sensors and…
-
Researchers at Harvard and MIT have achieved a breakthrough in continuous quantum computing, operating a 3,000-qubit neutral-atom system for over two hours without loss of coherence — a feat that marks the transition from pulsed, fragile experiments to persistent, reconfigurable quantum processors.
OODA Loop Analysis
These big three will make monumental shifts in the world. This new Tech Trinity will redefine our economy, both threaten and fortify our national security, and revolutionize our intelligence community. None of us are ready for this. This convergence requires a deepened commitment to foresight and preparation and planning on a level that is not occurring anywhere.
The principals at OODA have tracked the science and technology of quantum technologies for decades, including closely watching the emergence of commercial firms leveraging quantum effects for security, communications and sensing. We closely track the transition of R&D into real companies that can deliver solutions based on quantum effects and provide a short list of companies that do so on this page. The Quantum List those we believe are poised to have an impact on the economy, including firms that deliver capabilities in Quantum Computing, Quantum Security, Quantum Communications and Quantum Sensing. Companies we track on the list include: IBM, Google, Microsoft, D-Wave, OQC, Cold Quanta, IonQ, Rigetti Computing, Quantinuum, QuSecure, Quantum Xchange, QuintessenceLabs, Crypto Quantique, ID Quantique, QWERZ, SandboxAQ, Argit, Strange Works, Zapata, The Entanglement Institute, TerraQuantum, PsiQuantum, Xanadu.
What business decision-makers need to know now about quantum superiority. This guide captures key concepts and the status of major quantum computing research initiatives in a way meant to serve the needs of operational decision-makers. Our goal: inform you about the near future so you can make the right changes to your strategy today.
This is an update to our Executive’s Guide to Quantum Safe Security, based on a new round of research that has included interviews of OODA Network experts, technology providers and senior executives in enterprises. Quantum Computers will bring new power to adversaries. But when? And what can you do now to mitigate that threat? This report provides insights that can drive your action today.
Quantum key distribution (QKD) is an exciting application of quantum technologies that has exploded in the past decade. QKD is used to share encryption keys across an established optical link or network. QKD can be used to generate a secure, shared secret key between two users. This key is then used in an algorithm to encrypt message traffic. The big advantage QKD offers is that any attempt to read the information stored in the photons would destroy the message and be immediately detected. Quantum cryptography is fundamentally viable today in the laboratory and used in some high-end security applications, like banking and stock trading, that can rely on dedicated short distance physical fibers.
A new NIST program makes creative use of quantum technologies to deliver advanced measurement solutions to users in commerce, medicine, defense and academia. This delivery of measurement standards in a chip format is known as NIST on a CHIP (NOAC). The time for leaders to think of how this may change your business model is now.
Vikram Sharma is the CEO of QuintessenceLabs, a company he founded to leverage an understanding of how physics works at the quantum level to address some of the biggest issues in cybersecurity. In this discussion at OODAcon, Vikram provided a high level overview of what years of quantum theory and 1000’s of experiments on the nature of reality tell us about the nature of reality, especially reality when measured at the smallest scale. His insights into the world of quantum mechanics includes a description of some of some very strange observations, which are seen again and again in experiment after experiment.
Months ago we began to formulate an assessment that a history-making announcement in quantum computing was about to be made. For years the big players in quantum research, including IBM, Microsoft and Google, have been pursuing different methods of using quantum effects to do new calculations. Google had even made announcements indicating they thought they could achieve history-making results in the near term. Because of all that we had been producing a series of reports aimed at making you as informed as possible on what breakthrough announcements in quantum computing could mean for your business strategy. This post memorializes a point in history we should all remember, even though it was not a point where a real world use case was performed.
Context from OODA’s Matt Devost on the very near future of quantum computing. This is clearly an area where focused due diligence is required, both for how data is being stored and secured today and how enterprises should be preparing for an age of no more secrets.
Additional Research:
What To Do About Quantum Uncertainty: Guess what, besides uncertainty at a quantum level there is great uncertainty among business and policy makers regarding Quantum Computing.
AI, quantum computing and 5G could make criminals more dangerous than ever, warn police: Quantum is one of many emerging technologies that law enforcement professionals are tracking
Intel offers AI breakthrough in quantum computing: This article is more about quantum simulations for AI, but shows the ecosystem that is developing around the technology
Quantum Computing That Can Crack Modern Encryption More Than a Decade Away: When we see reports like this we wonder what qualifies the experts to say this. But in this case the experts are the National Academies of Sciences.
Could quantum computers render current bitcoin and most blockchain cryptography powerless?: There is a worry that new algorithms that could run on quantum computing could attack blockchain and asymmetric encryption.