Featured Analysis

17 Sep 2019

Deception Needs to be an Essential Element of Your Cyber Defense Strategy

In the cyber defense community, we talk about a wide-range of risk mitigating technologies, strategies, and activities.  We talk about attacker deterrence and increasing costs for the attacker.  We invest in endpoint agents, threat intelligence, DLM, and other mitigating technologies on a daily basis.

Here’s why one of the most compelling emerging use cases for increasing attacker costs is through the use of deception.

Read More
17 Sep 2019

The Executive’s Guide to Cyber Insurance

This special report provides an overview of the dynamic trends underway in the cyber insurance market, including actionable information that executives can put to use right now in determining the right approach to using cyber insurance to transfer risk. The report also provides insights which can be of use to any tech firm seeking to partner with insurance companies to enhance services to the market. 

Read More
13 Sep 2019

Which CIA Executive Impacted Snowden’s OODA Loop?

Edward Snowden’s new book is out next Tuesday, but OODA Loop got an advance copy.  In the book, Snowden identifies two major catalysts that not only pushed him over the edge, but also informed his strategy for how he leaked the highly classified material.  One of them was a complete surprise.

Read More
12 Sep 2019

The Executive’s Guide To Quantum Computing: What you need to know for your strategy today

This guide captures key concepts and the status of major quantum computing research initiatives in a way meant to serve the needs of operational decision-makers. Our goal, inform you about the near future so you can make the right changes to your strategy today. After a review of some key quantum computing concepts we will provide an update on some of the most promising research initiatives and key use cases being explored. We then conclude with insights you can use for your strategic approach and a list of resources for further research.

Read More
12 Sep 2019

Cyber Threat Analysis Report Vol 1, Edition 10

OODA’s Cyber Threat Analysis Report provides the “so what” behind the news and events we track on a daily basis. When it comes to putting cyber news in context, there really is no substitute for experience. The context in this report is provided by one of the most highly regarded cybersecurity practitioners and pioneer of cyber threat intelligence (and OODA Network expert) Mike Tanji. In this edition, Mike brings context into the ransomware attacks against cities, the changing situation regarding best practices in perimeter defense, stunt hacking and many other hot topics you will want to track.

Read More

OODA Loop is owned and operated by OODA LLC.  OODA helps our clients identify, manage, and respond to global risks and uncertainties while exploring emerging opportunities and developing robust and adaptive strategies for the future.  We are a global strategic advisory firm with deep DNA in global security, technology, and intelligence issues.

SHARE

Home New

Free Daily Intel Brief

Join over 10,000 global leaders by starting your day with our free Daily Pulse Intel Briefing.

 

Covering the top global cybersecurity, technology,

and risk issues each business day.

Thank you for subscribing.  Your contact details will never be shared.