The OODA Loop can be used both by defenders and incident responders for a variety of use cases such as threat assessment, threat monitoring, and threa…
First seen on securityweek.com
Jump to article: www.securityweek.com/the-ooda-loop-the-military-model-that-speeds-up-cybersecurity-response/