Ready for the Next Nightmare: The Art of Incident Response
During multiple war zone tours of duty in the Middle East and South Asia, I learned firsthand how timely and effective incident response entails real […] More
During multiple war zone tours of duty in the Middle East and South Asia, I learned firsthand how timely and effective incident response entails real […] More
Russian state-sponsored hackers reportedly stole details in 2015 on how the U.S. spies on foreign intelligence targets through cyber espionage, as well as how it […] More
In May 2015, Russia and China signed a “nonaggression pact” in cyberspace. They agreed not to target each other with cyber attacks and promote the […] More
It is a problem for the U.S. that many of the core concepts that guide internet policy date to the 1990s. One such concept is […] More
In the nearly seven years since the U.S. Department of Defense declared cyberspace a “domain” of warfare – alongside land, air, sea, and space – […] More
On Wednesday, the Department of Homeland Security (DHS) issued a binding directive compelling all federal civilian departments and agencies to identify and develop a plan […] More
Recent fatal accidents involving two vessels in the U.S. Seventh Fleet led to a spate of speculation about whether somehow the navigation in these ships […] More
There has been a recent wave of high-sea collisions in the Asia-Pacific involving U.S. naval vessels – most notably the USS Fitzgerald and USS John […] More
With round one of renegotiations behind us, and round two scheduled to begin on September 1 in Mexico City, despite efforts to move quickly, there […] More
The reality of modern times is that nations are in a constant state of cyber engagement – either for espionage, influence, or disruption purposes. While […] More
It’s likely only a matter of time before a major cyber attack hits U.S. civilian infrastructure, but the nature of that digital violation and the […] More
The taxonomy of cybersecurity often includes alarming declarations on par with acts of war. But cyber campaigns outside of active conflict hardly meet such a […] More
Nearly everyone now accepts that Russia attempted to interfere with the U.S. electoral process with the aim of harming Hillary Clinton’s presidential campaign. Even President […] More
No consensus report resulted from the yearlong negotiations of the 5th United Nations Group of Governmental Experts (GGE) on the Developments in the Field of […] More
The White House’s National Security team is expected to issue a report early this week outlining U.S. options for deterring adversaries in cyber space. The […] More
Unsurprisingly, the fifth UN Group of Governmental Experts (GGE) ran into difficulties that proved fatal. Previous GGEs operated in a more favorable international climate. The […] More
The fallout of major cyber attacks and espionage campaigns increasingly shapes interactions between nations. The vulnerability of the United States to such digital intrusions will […] More
Disruptive and intrusive cyber activity pervades much of modern international relations. The trend towards the jockeying for global influence and geopolitical positioning through cyber means […] More
Search