Conflict Minerals: The Dark Side of the Digital Age Electronics Boom
With the advent of digital communications, people thousands of miles apart can engage with each other seamlessly, and businesses can operate at a scale previously […] More
With the advent of digital communications, people thousands of miles apart can engage with each other seamlessly, and businesses can operate at a scale previously […] More
Malicious and trusted insiders pose a range of challenges in terms of counterintelligence risks and physical threats, and experts say policy needs to catch up […] More
The explosion of data in a digital world has exposed people to volumes of information as never before. But just as this data will increase […] More
National Geospatial-Intelligence Agency Deputy Director Susan Gordon on Wednesday called for the government and Intelligence Community to prioritize innovation to better confront the broad array […] More
Few security challenges muddle the distinction between government and business roles as those emanating from cyberspace. National security issues no longer remain solely under the […] More
Statecraft and business have always been closely linked, but the advent of digital technology has blurred the roles more than ever. Systems crucial to the […] More
The United Kingdom has revamped the way its intelligence agencies collaborate with private industry by establishing a new National Cyber Security Centre that leans towards […] More
Terrorists’ tactics evolve with the times. Just as we have seen an adaption of terrorist methods for sowing fear and distrust, so, too, we have […] More
Continuing terror attacks around the world indicate law enforcement and intelligence agencies face difficulty in trying to identify and disrupt the plans of globally disparate […] More
Discussion of malicious cyber activity has mainly focused on criminal activity and countries’ intelligence efforts. Entities other than national governments – particularly terrorist groups – […] More
The worldwide WannaCry ransomware, which targeted computers running the Microsoft Windows operating system, was an admonition to everyone who connects to cyberspace – especially the […] More
Over the past few weeks, a critical question has been discussed amidst cybersecurity professionals and experts. Who would pair North Korean-linked malware with an alleged […] More
Today China began enforcing its controversial new Cybersecurity Law, which broadly demands that multinational companies make data accessible to the Chinese government while strengthening the […] More
The U.S. Missile Defense Agency (MDA) performed a successful test of the Ground-based Missile Defense (GMD) system on Tuesday. This was the first test of […] More
A new DIA effort to attract a wider range of contractors and be nimbler is showing promise despite the hurdles it has to jump. The […] More
We are living in a new era, with unprecedented industrial scale theft of intellectual property and company secrets. The most recent example is a vast […] More
Is this ever going to end? The daily barrage of hacking news assaulting us in headlines is making us numb, if not scared to death. […] More
One of the emerging trends in today’s expanding cyber espionage landscape has been China’s emergence as the leading practitioner of economic cyber espionage. What does […] More
Search