This page serves as a dynamic resource for OODA Network members looking for Quantum Computing, Quantum Security and Quantum Sensing insights to drive their decision-making process.
-
A new wave of U.S./U.K. sanctions and a global joint advisory on operational technology (OT) risks underscore a rapidly escalating campaign by pro-Russia hacktivist groups targeting critical infrastructure worldwide.
-
OODA Network Member Bill Vass (Booz Allen Chief Technology Officer) and Booz Allen SVP Munjeet Singh showed how physical AI, digital proving grounds, and agentic autonomy are converging to reshape real-world robotics, test ranges, and national-security missions.
-
At OODAcon 2025, former CIA Directorate of Science and Technology chief Dawn Meyerriecks delivered a blunt warning: America’s strategic advantage will not come from scale, but from adaptability – and the nation is losing ground on talent, industrial capacity, and economic security faster than policymakers realize.
-
OODA network members have access to an extensive repository of research and analysis on the impact of technology on geopolitics, business strategy and cybersecurity. This human generated, expert vetted information created to inform decisions of our membership, and has always been available by both search and topical categorization. These insights now form the foundation of…
-
This OODAcon 2025 session convened an all-star panel of national security technologists to examine how AI, automation, and space systems are reshaping the modernization of the U.S. military.
-
We continue to track the insights of Nate Fick (now in his “post-State Department Era”}. In November, we caught up with him as he moderated a panel at the 2025 Aspen Cyber Summit in Washington, D.C entitled “Strategic Frontlines: Cyber Policy in the Asia-Pacific”.
-
Welcome to 9th edition of my annual top 10 books list! Each year, I read close to 100 books and distill down my 10 favorite security, technology and business books into this top 10 list and also include my favorite fiction books of year and a handful of honorable mentions that didn’t make the top…
-
Do Tariffs Solicit Cyber Attention? Escalating Risk in a Fractured Supply Chain Regardless of criticisms of tariff imposition as a tool of foreign policy, it is clear that the United States’ use of them is viewed by the Administration as a way of righting scales in a variety of areas, to include revenue generation; job/manufacturing…
-
Hacker-turned-concert pianist Serene makes the case that the fight for internet freedom is no longer just a technical challenge – it’s a cultural, political, and human one. Archived video an expanded analysis of her OODAcon 2025 conversation with OODA CEO Matt Devost can be found here.
-
Every year we gather a select group of business and government leaders at OODAcon, where we provide insights into defining issues shaping strategy and decision-making in this age of exponential technologies. It was also the perfect opportunity to reflect on a key topic which has been discussed for years in the OODA network: How should…
-
AI’s diffusion is now inseparable from its compute infrastructure. 2025 marks the year when nations and hyperscalers began measuring, monetizing, and governing “AI compute” as a strategic asset, linking sovereign cloud capacity, public-private infrastructure build-outs, and the spread of AI capabilities across sectors and economies.
-
At OODAcon 2025, hardware transparency took center stage as Allan Friedman introduced the Hardware Bill of Materials (HBOM) as the next critical pillar of national resilience. The archived video and an expanded summary of the discussion are available here.
-
China’s 2026 Cybersecurity Law Amendments: A Risk for U.S. Organizations The new amendments to China’s Cybersecurity Law (CSL), set to take effect on January 1, 2026, should register as a notable shift. The old CSL, which went into effect June 2017, laid a foundation for network operation security, data localization, and critical infrastructure protection for…
-
In my recent invited Congressional expert witness testimony before the U.S. House Judiciary Committee’s Subcommittee on Courts, Intellectual Property, Artificial Intelligence, and the Internet, I emphasized that the United States is experiencing multiple simultaneous tech revolutions beyond just AI. As we navigate advances in space tech, biotech, quantum tech, and the miniaturization of sensors and…
-
Researchers at Harvard and MIT have achieved a breakthrough in continuous quantum computing, operating a 3,000-qubit neutral-atom system for over two hours without loss of coherence — a feat that marks the transition from pulsed, fragile experiments to persistent, reconfigurable quantum processors.
-
Artificial intelligence is rapidly transforming how U.S. capital and derivatives markets operate — from trading algorithms and risk models to regulatory surveillance — raising new systemic, cybersecurity, and accountability challenges that Congress and regulators must address.
-
Alphabet recently released the details of X Development’s Project Suncatcher – an audacious vision for scaling artificial intelligence (AI) infrastructure into orbit by coupling solar-powered satellites equipped with Tensor Processing Units (TPUs) and free-space optical networks.
-
Consistent with the substance, tone and tenor of presentations at OODAcon 2025 last week, Secretary Hegseth earlier today announced a major acquisition reform effort designed to put rapid acquisition of technology at the center of Pentagon operations and strategic policy.
-
China and the United States are locked in a technological race to define the future of warfare through Physical AI—the fusion of artificial intelligence and computer graphics simulations with real-world, sensor-rich environments.
-
Dartmouth’s Institute for Security, Technology, and Society (ISTS) convened thirty experts from government, industry, academia, and venture capital to assess how the private sector currently supports U.S. offensive cyber operations—and to propose ways to scale this partnership responsibly.
-
A recent October 22, 2025 article revealed that the Cybersecurity and Infrastructure Security Agency (CISA) will be laying off nearly all of its 95 employees within the Stakeholder Engagement Division (SED), effectively dismantling three of its four operational units. The division historically served as CISA’s linchpin linking the agency with state and local governments, private…
-
Accelerating Disruptive Technologies: October 29, 2025 | Reston, VA
-
This year’s OODAcon theme is Accelerating Disruptive Technologies, recognizing that the pace of technological advancement demands new frameworks for assessing, adopting and scaling innovation.
-
Outpacing fast-moving adversaries requires procurement built for speed. Across the U.S. national‑security enterprise, acquisition has been reframed as a strategic capability—compressing timelines from prototype to fielded capability.
-
The OODAcon 2025 panel “From Automation to Autonomy: Navigating the Next Wave of AI Agents,” led by experts Josh Devon, Thomas Quinn, David Ginn, Josh Ray, and Andy Black, will confront a defining question for enterprise leaders: how to operate (and secure) organizations run by autonomous AI agents.
-
According to Bill Hagestad at RedDragon1949, China is rapidly transitioning from legacy informationized warfare to intelligentized, AI-driven, cognitive warfare — reshaping the future of strategic competition.
-
The hardware supply chain is a clear front in the global competition to control (or at least heavily influence) the global IT supply chain — and Hardware Bills of Materials (HBOMs) are emerging as the critical tool for transparency and risk reduction.
-
The global race to expand AI compute is pushing data centers underwater, into orbit, and adjacent to new energy sources — reshaping critical infrastructure and geopolitical risk.
-
This post is a reference designed to help you make the most of discussions on quantum, both at OODAcon and beyond
-
This summer at DEFCON 33, DARPA’s 2025 AI Cyber Challenge showcased how generative and agentic AI can autonomously find and fix vulnerabilities in complex software systems.
OODA Loop Analysis
These big three will make monumental shifts in the world. This new Tech Trinity will redefine our economy, both threaten and fortify our national security, and revolutionize our intelligence community. None of us are ready for this. This convergence requires a deepened commitment to foresight and preparation and planning on a level that is not occurring anywhere.
The principals at OODA have tracked the science and technology of quantum technologies for decades, including closely watching the emergence of commercial firms leveraging quantum effects for security, communications and sensing. We closely track the transition of R&D into real companies that can deliver solutions based on quantum effects and provide a short list of companies that do so on this page. The Quantum List those we believe are poised to have an impact on the economy, including firms that deliver capabilities in Quantum Computing, Quantum Security, Quantum Communications and Quantum Sensing. Companies we track on the list include: IBM, Google, Microsoft, D-Wave, OQC, Cold Quanta, IonQ, Rigetti Computing, Quantinuum, QuSecure, Quantum Xchange, QuintessenceLabs, Crypto Quantique, ID Quantique, QWERZ, SandboxAQ, Argit, Strange Works, Zapata, The Entanglement Institute, TerraQuantum, PsiQuantum, Xanadu.
What business decision-makers need to know now about quantum superiority. This guide captures key concepts and the status of major quantum computing research initiatives in a way meant to serve the needs of operational decision-makers. Our goal: inform you about the near future so you can make the right changes to your strategy today.
This is an update to our Executive’s Guide to Quantum Safe Security, based on a new round of research that has included interviews of OODA Network experts, technology providers and senior executives in enterprises. Quantum Computers will bring new power to adversaries. But when? And what can you do now to mitigate that threat? This report provides insights that can drive your action today.
Quantum key distribution (QKD) is an exciting application of quantum technologies that has exploded in the past decade. QKD is used to share encryption keys across an established optical link or network. QKD can be used to generate a secure, shared secret key between two users. This key is then used in an algorithm to encrypt message traffic. The big advantage QKD offers is that any attempt to read the information stored in the photons would destroy the message and be immediately detected. Quantum cryptography is fundamentally viable today in the laboratory and used in some high-end security applications, like banking and stock trading, that can rely on dedicated short distance physical fibers.
A new NIST program makes creative use of quantum technologies to deliver advanced measurement solutions to users in commerce, medicine, defense and academia. This delivery of measurement standards in a chip format is known as NIST on a CHIP (NOAC). The time for leaders to think of how this may change your business model is now.
Vikram Sharma is the CEO of QuintessenceLabs, a company he founded to leverage an understanding of how physics works at the quantum level to address some of the biggest issues in cybersecurity. In this discussion at OODAcon, Vikram provided a high level overview of what years of quantum theory and 1000’s of experiments on the nature of reality tell us about the nature of reality, especially reality when measured at the smallest scale. His insights into the world of quantum mechanics includes a description of some of some very strange observations, which are seen again and again in experiment after experiment.
Months ago we began to formulate an assessment that a history-making announcement in quantum computing was about to be made. For years the big players in quantum research, including IBM, Microsoft and Google, have been pursuing different methods of using quantum effects to do new calculations. Google had even made announcements indicating they thought they could achieve history-making results in the near term. Because of all that we had been producing a series of reports aimed at making you as informed as possible on what breakthrough announcements in quantum computing could mean for your business strategy. This post memorializes a point in history we should all remember, even though it was not a point where a real world use case was performed.
Context from OODA’s Matt Devost on the very near future of quantum computing. This is clearly an area where focused due diligence is required, both for how data is being stored and secured today and how enterprises should be preparing for an age of no more secrets.
Additional Research:
What To Do About Quantum Uncertainty: Guess what, besides uncertainty at a quantum level there is great uncertainty among business and policy makers regarding Quantum Computing.
AI, quantum computing and 5G could make criminals more dangerous than ever, warn police: Quantum is one of many emerging technologies that law enforcement professionals are tracking
Intel offers AI breakthrough in quantum computing: This article is more about quantum simulations for AI, but shows the ecosystem that is developing around the technology
Quantum Computing That Can Crack Modern Encryption More Than a Decade Away: When we see reports like this we wonder what qualifies the experts to say this. But in this case the experts are the National Academies of Sciences.
Could quantum computers render current bitcoin and most blockchain cryptography powerless?: There is a worry that new algorithms that could run on quantum computing could attack blockchain and asymmetric encryption.