Advertisements

looking beyond borders

foreign policy and global economy

Archive for the category “Cyber Security”

The Biggest Cybersecurity Disasters Of 2017 So Far

The first six months of 2017 have seen an inordinate number of cybersecurity meltdowns. And they weren’t just your standard corporate breaches. It’s only July, and already there’s been viral, state-sponsored ransomware, leaks of spy tools from US intelligence agencies, and full-on campaign hacking. And that’s just the beginning.

Read Here – Wired

Advertisements

The Problem Of Siloed Cyber Warriors

Cyber capabilities cannot be detached from other domains of warfare, such as electromagnetic, air, land, sea, and space. The future holds two potential battlefields that overlap: one fought between high-tech adversary militaries, and another, between highly specialised military units and insurgent forces in population-dense urban environments. In both situations, cyber capabilities must be integrated into all other domains of warfare.

Read Here – The Cipher Brief

Can the Intelligence Community Secure Its Own Hacking Tools?

In the case of the latest Wikileaks document dump, the first in a planned series from a cache the site has dubbed “Vault 7,” we have an apparent reversal of the formula: The un-coverup—the fact of the leak itself—is probably more significant than the substance of what has thus far been revealed.

Read Here – The Atlantic

India’s Cyber Potential: A Bridge Between East And West

While the most common points of reference to engagements in cyberspace are in the United States, Europe, Russia, and China, other countries are quickly realizing the importance of securing critical networks from crime, sabotage, subversion, and espionage. As the country with one of the world’s fastest-growing populations and economies, this realization is bearing down on India more than most.

Read Here – The Cipher Brief

 

Cybersecurity In The Gulf: The Middle East’s Virtual Frontline

The Middle East, particularly the Gulf states, are quickly recognizing the urgent need for better cybersecurity, while regional adversaries such as Iran have begun weaponizing code as an extension of broader strategic goals within the region. What, though, is the Gulf’s current cybersecurity atmosphere, and how does Iran’s emerging use of offensive cyber capabilities fit into its broader strategy in the Middle East?

Read Here – The Cipher Brief

Russia, China, And Cyber Espionage

Cyber operations are also an essentially asymmetric tool, in that they level the playing field between nations that may have wide disparities in terms of the effectiveness of their conventional forces. However, this cuts both ways, as the United States also conducts a considerable number of cyber operations in support of intelligence collection. This leads into the third primary advantage of cyber as it relates to espionage, which is that cyber-capabilities make exfiltrating large volumes of information much, much easier than would be the case otherwise.

Read Here – The Cipher Brief

Digital Armament

Besides the shiny world of social media, hard information technology work has been part of the U.S. governments for decades, but critics believe that the way the government deals with cyber issues is outdated or doesn’t even exist appropriately. Recently, the White House published the long-awaited Cybersecurity Strategy and Implementation Plan (CSIP), which aims to strengthen and protect the federal networks and systems.

Read Here – The European

Oops! Someone Just Leaked The Price List For Cyberwar

On Monday, the Italian company Hacking Team, which produces secret cyber weapons for law-enforcement and government clients around the world, became the victim of an embarrassing public disclosure: more than 400 gigabytes of internal data made its way online in a widely shared torrent file.

Read Here – Defense One

Enter The Trolls

Digital wars are being fought in many theatres around the world – and in many forms. In the light of the Snowden revelations, citizens who guard their privacy may already feel that it has been occupied by a hostile force. But on Thursday, the Obama administration conceded that the US federal government had itself fallen victim to a hack on an unprecedented scale, with the security of the details of up to four million former and present employees apparently breached.

Read Here – The Guardian

Open Battlefield

The characteristic of cyber warfare that makes it so uniquely dangerous to the corporate sector is that military power in the cyber domain must be extended through computer networks provided and maintained by non-governmental bodies.

Read Here – The Diplomat

Post Navigation

%d bloggers like this: