15 Dec 2021

Improving quality management in digital production through artificial intelligence

ETH researchers are using artificial intelligence to improve quality management in digital production processes. The team has succeeded in halving the proportion of defective products in an experiment with the semiconductor manufacturer Hitachi Energy. Complex machinery, pharmaceutical products or microchips: the more expensive a product, the more important its quality

Read More
10 Dec 2021

Evergrande can’t pay its debts. China is scrambling to contain the fallout

Beijing is intervening to prevent a disorderly collapse of Evergrande after it has defaulted on its debt. The collapse of the real estate group could wreak havoc on the world’s second biggest economy. The property developer has entered “restricted default” after the company was unable to pay off interest that

Read More
01 Dec 2021

Artificial Intelligence: How Business Leaders Can Tap Into Their Blue Sky Opportunities

The pandemic forced the hands of many executives who had previously hesitated to sponsor transformation; many leaders needed a disruptive event like this to prioritize such activities and think outside the box. It’s been surprising to see the speed with which digital transformation has finally taken place, particularly within industries

Read More
11 Nov 2021

Blockchain In Supply Chain

Is your supply chain ready for the blockchain? Cryptocurrencies are the most commonly cited examples of blockchain’s potential, but it’s the technology itself that’s attracting attention from those outside finance. From increased security and visibility to tracking complex variables related to sustainability and ethical sourcing, blockchain is set to help procurement organizations

Read More
13 Sep 2021

Intelligence, Afghanistan, and Hedging Bets

I am a member of OODA Loop. The few discussions that I have been able to listen to thus far were extremely informative, especially the most recent one on Afghanistan and intelligence issues.  It prompted a few comments on intelligence collection and hedging bets amongst regional and great power players in Afghanistan. 

This article was generated from the OODA Network Member monthly meeting and access is restricted accordingly. If you are an OODA Subscriber, but not a member of our expert network, you will not be able to access this content.

Read More
16 Mar 2021

The US must adopt Software Bill of Materials to thwart cyberattacks

Following the SolarWinds Russian espionage campaign against the US government, the White House addressed possible executive action on February 17 in response to the most systemic hack of the US government in history. However, experts have criticized the Software Bill of Material’s (SBOM) ability to prevent similar incidents, or worse,

Read More
19 Feb 2021

Michele Wucker on Identifying and Confronting the Obvious Risks of Gray Rhinos

Michele Wucker is specialist in risk management and crisis anticipation and is author of the book “The Gray Rhino: How to Recognize and Act on the Obvious Dangers We Ignore”. While we’ve all become familiar with Taleb’s concept of Black Swans, we must equally become intimately aquatinted with Wucker’s Gray Rhinos as they provide more obvious opportunities for actually anticipating and managing risk.

During this interview, Michele takes us through the concept of Gray Rhinos with real-world historical examples, discussion of future Gray Rhinos, and strategies for engaging in real actions to identify, respond to, and mitigate future Gray Rhinos in business, society, and global affairs. The concept of a Gray Rhino is hugely important and has become embedded in how we evaluate risks at OODA with our customers.

Read More
18 Dec 2019

11 Habits of Highly Effective CISOs

What does it take to be a highly effective CISO? Over the past 25 years, I’ve consulted for hundreds of executives on cybersecurity issues including direct support to dozens of CISOs working to effectively manage cyber risk in a wide variety of organizations.  With this post, I’ve attempted to capture some of the best practices from the most effective CISOs I know. In future articles, we’ll look at each of the 10 habits in greater detail, including direct input from the CISO community. 

Read More
11 Dec 2019

Data Leak Week: Billions of Sensitive Files Exposed Online

Earlier this week, separate data exposure incidents left a total of 2.7 billion email addresses, 1 billion passwords, and nearly 800,000 applications for copies of birth certificates were found on unsecured cloud buckets by security researcher Bob Diachenko. Organizations continue to fail to lock down their cloud servers, and researchers

Read More
11 Dec 2019

Here’s what will happen to your Windows 7 PC on January 15, 2020

After January 14, Windows 7 users will get no more security updates to the operating system for free, warns Microsoft. Even though users will be able to continue to run Windows 7 after January, they could potentially face more security problems. Microsoft plans to deliver a new pop up notification

Read More