Cyber Proxies: A Central Tenet of Russia’s Hybrid Warfare
Cyber operations remain at the forefront of confrontations between the West and Moscow as relations continue to deteriorate. Russia asserted itself in 2007 with “patriotic […] More
Cyber operations remain at the forefront of confrontations between the West and Moscow as relations continue to deteriorate. Russia asserted itself in 2007 with “patriotic […] More
Understanding the Russian criminal underground is essential when discussing Russian proxies in cyberspace. How do cybercriminal entities interact with each other and what is their […] More
For many, cybersecurity is a technical problem and therefore requires technical solutions. But for policymakers and the national security community, a key takeaway from this […] More
The cybersecurity industry, much like other sectors, is dealing with an influx of data. In response, security experts hope to harness the power of artificial […] More
Since the first CIA Predator drone strike in October 2001, the United States, among others, has sought to expand the technology to facilitate remote warfare. […] More
Remotely controlled aircraft, or drones, have long become common in military settings—possibly most infamously pictured as a U.S. Predator launching Hellfire missiles at suspected terrorists […] More
While receiving significant publicity from global media, the rise of the humanitarian drone is so far more of a whimper than a bang. This article […] More
The cybersecurity industry is currently enamored with concepts of autonomous defense, including elements of machine learning, behavioral analytics, and artificial intelligence—and rightly so. Programed to […] More
Many view cybersecurity as passively blocking attempts to breach networks, but security experts have long advocated more active measures in defense of sensitive networks. Advances […] More
We live in an age where what used to be the figment of science fiction is now a reality, changing the way people go about […] More
With cybercrime expected to reach costs nearing $2 trillion by 2019, firms are urgently seeking ways to better defend their networks from the harmful impacts […] More
Cybersecurity is often discussed in relation to the major global powers: China’s economic espionage, Russian influence operations, and U.S. dragnet global surveillance to thwart terrorism. […] More
Cyber is emerging as Iran’s weapon of choice for dealing with both domestic and foreign opponents. For more than a decade, the Islamic Republic has […] More
Recent years have witnessed a series of increasingly audacious and unprecedented cyber attacks, leading up to the recent accusations of Russian hacking throughout last year’s […] More
For years, the easiest avenue to conduct a cyber attack against a business or an organization was social engineering attacks via emails. While still a […] More
President Donald J. Trump’s Administration has suggested massive overhauls in a number of policy areas, but few have remained as shrouded in uncertainty as Trump’s […] More
U.S. failure to fully develop and implement a comprehensive cyber security strategy created the perfect opportunity for Russia to attack the Democratic National Committee computer […] More
In the fall of 2008, a bipartisan group of cybersecurity experts delivered some sage advice to Barack Obama, set to become president in January: “Don’t […] More
Search