China Pivots its Hackers from Industrial Spies to Cyber Warriors
China continues to deploy military equipment to contested islands in the South China Sea, raising concerns among regional players and U.S. forces stationed in the […] More
China continues to deploy military equipment to contested islands in the South China Sea, raising concerns among regional players and U.S. forces stationed in the […] More
In September 2015, Chinese President Xi Jinping and President Barack Obama reached an agreement that neither nation would “conduct or knowingly support cyber-enabled theft of […] More
China is a burgeoning great power. It is continually figuring out the various dimensions of power – not least of which is power in cyberspace […] More
Connectivity continues to enmesh businesses, governments, societies and people – a trend that will only accelerate with the growth of public cloud services and devices […] More
In the world of network security, the term air gap refers to a situation in which the computer network is physically separated from other networks, […] More
An air gap – meaning, a computer without direct network access of any kind – seems like the perfect solution to the gossamer threads of […] More
FBI Director James Comey confirmed on Monday, for the first time, that the agency is conducting an investigation into whether there was any coordination between […] More
European countries are becoming increasingly wary of foreign disinformation and subversion operations in their own internal politics following Russian interference in last year’s U.S. elections. […] More
Where will Russian President Vladimir Putin strike next? With the 2018 Russian election around the corner, former Soviet states are nervous. Foreign adventures are the […] More
Russian offensive cyber capabilities are as sophisticated as those of other major cyber powers, such as the United States and China, and they likely exceed […] More
In 2013, former President Barack Obama was close to ending the “dual-hat” leadership of both the National Security Agency and U.S. Cyber Command, only to […] More
There as been discussion of a separation between the National Security Agency and U.S. Cyber Command for a while, only for the change in administrations […] More
WikiLeaks on Tuesday published what it claims to be the CIA’s hacking techniques to exploit devices such as smart phones, computers, and Internet-connected televisions for […] More
As an economic power and pivotal regional player in Asia, India is home to the second-highest number of internet users of any country in the […] More
As connectivity increases, India is beginning to put in motion efforts to secure its government and private networks. Like other countries, India is experiencing the […] More
Security researchers and policymakers around the world are struggling with the challenge of securing the digital networks that governments, private companies, and people in general […] More
A group of international law experts met in Tallinn, Estonia, after the 2007 onslaught of cyber attacks against sites in the country, to create the […] More
Cyberspace is often portrayed as a new domain of international relations – a Wild West where there are no rules or guiding principles to govern […] More
Search