Cyberwarfare
Cybersecurity Lessons from the Pandemic: Prevention
Prevention lies somewhere between avoidance and protection, and preventative methods can belong to either. For example, what is stopping outsiders from entering your country or state or town in order to limit ...
The Burisma Hack … Cyberwar or Not?
Just to complicate things further, we learned from a New York Times article that Russian military cyber-forces hacked into Ukrainian gas company, Burisma, apparently in an attempt to find incriminating evidence against ...
Taking the Fifth …
“The Fifth Domain” is a recent book by Richard A. Clarke and Robert K. Knake. It is about cybersecurity and how it has become the fifth military domain following land, sea, air ...
Are Ransom Payments Supporting Terrorists?
Organizations, particularly those that recognize that they don’t have essential security and data recovery measures in place, have taken out cyber insurance, which they are regularly using to pay off ransomware attackers ...
“All for One and One for All”
… So chanted the Three Musketeers. One of my main issues with cybersecurity risk management is that organizations seek to secure their own systems, data and networks, hoping that attackers will move ...
The Legality of Waging War in Cyberspace
In cyberwar, there is a fine line between acts of war and espionage On June 14, the New York Times reported that U.S. active cyber agents had demonstrated their ability to penetrate ...
Cyberwarfare—Yes? Cyber Insurance—No!
Just when you think that you are covered, you discover that you may not necessarily be protected by your cyber insurance. That was the startling message in an article by Adam Satariano ...
Cyberwarfare security solutions for large enterprises
The impact of cyberwarfare The impact of cyberwarfare on political organizations and critical infrastructure vendors is well-documented. What is considerably less discussed, however, is how and why... Go on to the site ...
How to Protect Files With Canary Tokens
We are living in a world where terms such as data breach, vulnerability and cyberattack have been headlines. The number of vulnerabilities doesn’t stop growing and we only have to look back ...
The Time Has Come for Rules of Engagement for Cyberwarfare
After over half a century of unmatched global security dominance, the United States and its western allies are now faced with a rapidly-changing playing field in what is now considered the... Go ...

