Cyber Warfare

There will be war, but there will be no blood; economies might cripple but there will be no gun powder involved. Apart from the mortar shelling and the gunfire that is usually exchanged between the two South Asian rivals- India and Pakistan during the Independence Day, cyber wars between the two nations have also become […]

by

You can’t open a newspaper or turn on the TV these days without hearing about hacking in American elections. Many liberals blame cyberattacks for Donald Trump’s presidency, while some conservatives dismiss them as an invention of the liberal media. Neither group is right. Long before 2016, foreign governments were targeting Republican and Democratic campaigns, trying […]

by

We could begin by working through the existing global security framework. NATO allies, for example, could collaborate by sharing forensic intelligence from cyberattacks and building better detection and response techniques. Separately, countries could create international working groups to discuss how to react to attacks and what to do in the days or weeks before we […]

by

Cyberwar: Here’s what you need to know. Getty Images/iStockphoto What is cyberwar? At its core, cyberwarfare is the use of digital attacks by one state to disrupt the computer systems of another in order to create significant damage or destruction. What does cyberwarfare look like? Cyberwar is still an emerging concept, but… read more at: […]

by

North Korean soldiers march during a mass military parade to mark the 70th anniversary of the Worker’s Party of Korea on October 10, 2015 On July 4 this year, timed to coincide with America’s Independence Day, North Korea launched its first intercontinental ballistic missile. It was a gift, said leader Kim Jong Un, for the […]

by

The characteristics of the cybersecurity war in which the United States is now engaged are not dissimilar from any team sporting contest. Whether in football, baseball or basketball, the game is won or lost on four key elements. Winning almost always comes down to offense, defense, coaching and playbook execution. In cybersecurity, winners and losers are […]

by