The OODA Loop can be used both by defenders and incident responders for a variety of use cases such as threat assessment, threat monitoring, and threat hunting.

The post The OODA Loop: The Military Model That Speeds Up Cybersecurity Response appeared first on SecurityWeek.

Original link
(Originally posted by Etay Maor)