
Securing AI – Four Areas to Focus on Right Now
Given that we know AI and Machine Learning will be impactful in the enterprise, modern organizations would do well to develop an approach for securing their AI assets now.

Russia 2020 – What Will Putin Do Next?
With the 2018 midterm elections completed an appropriate level of focus is required to think through “What’s next?” from and adversarial perspective. While is highly unlikely that Russia sits this one out, it is as equally unlikely that the next series of influence operations will look like the previous ones in 2016. How will Russian strategies of “reflexive control” and “hybrid warfare” impact the United States and other going forward?
Proactively thinking about adversary innovation needs to be a critical part of our cyber defense strategy, not just within the U.S. government but in private industry as well. Here is our informal take on some of the threat trends we will be confronting over the next two years.

The Russian Threat – An OODA Network Webinar
OODA Network Members are invited to participate in our webinar on the Russian Threat scheduled for Tuesday February 19, 2019 at 2:00 p.m. EST.

Here’s What the New U.S. Intelligence Strategy Says About Cyber Threats
The United States intelligence strategy for 2019 has been released, covering seven specific themes. Here’s how the United States Intelligence Community will deal with cyber threats: “Despite growing awareness of cyber threats and improving cyber defenses, nearly all information, communication networks, and systems will be at risk for years to

The Five Modes of HACKthink
How can you use HACKthinking to solve complex problems or evolve or develop a disruptive solution.

OODA Trends 2019
OODA Founders Matt Devost & Bob Gourley provide their eccentric take on emerging technology trends for 2019.

Best Security, Business, and Technology Books of 2018
The top ten books of the year as curated by OODA Loop founder Matt Devost.

Technological entanglement
An interesting paper from the Australian Strategic Policy Institute looking at issues of entanglement and dual-use technologies.

Putin’s Cyber OODA Loop is Tighter Than Yours
While hosting a delegation from France, Putin advised that to prevent cyber attacks, nations will have to establish international norms prohibiting such behavior. “This is what I can say about cyberattacks or war of words in the press and other issues. Action always causes reaction. Always. If one does not

Is Quantum Computing Ushering in an Era of No More Secrets?
In one of my favorite movies of all time, a brilliant mathematician creates a device capable of breaking the encryption used for air traffic control, global banking, and other critical applications. His company Setec Astronomy (an anagram for Too Many Secrets) has created such a powerful secret breaking device that