The OODA Loop can be used both by defenders and incident responders for a variety of use cases such as threat assessment, threat monitoring, and threat hunting. The post The OODA Loop: The Military Model That Speeds Up Cybersecurity Response appeared first on SecurityWeek. Original link(Originally posted by Etay Maor)