14 Jan 2019

Manage Insider Risk and Prevent ‘Big Brother’ Perception, Part 4

This is the final article in a four-part series focused on proactively managing corporate security culture and workforce expectations as your organization prepares to prevent, detect, and respond to insider risk incidents.

Read More
10 Jan 2019

Here’s How DHS Expects Cyberattackers to Target Emergency Services

The Department of Homeland Security has issued an analytic graphic detailing how it expects cyber attacks against the Emergency Services Sector could be conducted.

Read More
09 Jan 2019

The Five Modes of HACKthink

How can you use HACKthinking to solve complex problems or evolve or develop a disruptive solution.

Read More
08 Jan 2019

OODA Trends 2019

OODA Founders Matt Devost & Bob Gourley provide their eccentric take on emerging technology trends for 2019.

Read More
03 Jan 2019

AI Will Test American Values In The Battlefield

How will military leaders deal with AI that may treat troops as expendable assets to win the “game”.

Read More
11 Dec 2018

Manage Insider Risk and Prevent ‘Big Brother’ Perception, Part 3

The third article in a four-part series focused on proactively managing corporate security culture

Read More
03 Dec 2018

Join OODA at the People Centered Internet to Help Shape the Future of Humanity

A historic meeting is being convened 10 December 2018 to help ensure humanity is in charge of our own destiny. This event, convened by the People-Centered Internet Coalition, includes key Internet pioneers and next generation change agents coming together to share lessons learned and chart a course for the future.

Read More
26 Nov 2018

Best Security, Business, and Technology Books of 2018

The top ten books of the year as curated by OODA Loop founder Matt Devost.

Read More
19 Nov 2018

Terror Threat Snapshot

The U.S. House Homeland Security Committee has released a new Terror Threat Snapshot report.

Read More
22 Oct 2018

Manage Insider Threat Risk and Prevent ‘Big Brother’ Perception, Part 2

This is the second article in a four-part series focused on proactively managing corporate security culture and workforce expectations as your organization prepares to prevent, detect, and respond to insider risk incidents.

Read More