Tallinn Manual 2.0: Stepping Out of the Fog in Cyberspace
Cyberspace is often portrayed as a new domain of international relations – a Wild West where there are no rules or guiding principles to govern […] More
Cyberspace is often portrayed as a new domain of international relations – a Wild West where there are no rules or guiding principles to govern […] More
NATO’s Cooperative Cyber Defence Centre of Excellence last month published the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, a follow-on project […] More
A group of international law experts met in Tallinn, Estonia, after the 2007 onslaught of cyber attacks against sites in the country, to create the […] More
Editor’s Note: Over the coming days, The Cipher Brief presents some of our most incisive coverage on key issues of 2016 and a look ahead […] More
Back in August, The Cipher Brief sat down with Leo Taddeo, Chief Security Officer for Cryptzone, to discuss the cyber threats posed by Russia and […] More
U.S. competitors and adversaries are probably” mystified,” says the Atlantic Council’s Mathew Burrows, by President-elect Donald Trump’s refusal to accept a CIA assessment that Russia […] More
The Cipher Brief spoke with Justin Harvey, CSO of Fidelis Cybersecurity, about the cyber threats posed by both China and Russia. According to Harvey, although […] More
In the wake of a series of hacks against government and private networks, it is clear that Russia and China are among the most active […] More
The Office of Personnel Management (OPM) hack raised the threat of Chinese cyber-espionage in a way that the American people had never seen before. American […] More
After years of the U.S. suffering losses valued in the billions of dollars due to economically-motivated cyber espionage from China, there are some signs that […] More
Many metaphors have been applied to the Internet—information superhighway, World Wide Web, cyberspace, etc.—each evoking its different aspects. A more comprehensive view is that the […] More
Hollywood has a clear idea of what it would look like if someone used cyber-capabilities against us: a man in a room full of screens […] More
Search