The Cybersecurity Information Sharing Act (CISA) of 2015 has been the bedrock of the U.S. government’s formal mechanism for sharing cyber threat information with the private sector. As its sunset clause approaches (September 30, 2025), it’s not ...
Analysis
Cognitive Warfare in Cyberspace: A Brief Look at China, Russia, and the United States
Cognitive warfare has emerged as one of the most significant dimensions of modern conflict. Unlike traditional military operations aimed at seizing territory ...
Analysis
Google appears poised to engage in more proactive cyber operations to defend its interests, as well as other American entities, from hostile threat actors.
Analysis
What Does Restructuring State’s Cyber Program Mean for the U.S.’ Cyber Plan?
Recently, the United States’ Department of State restructured its Bureau of Cyberspace and Digital Policy (CDP), letting go of some senior officials and restructuring ...
Analysis
Recently, a joint European-led operation combining the efforts of several law enforcement agencies successfully disrupted the activities of a pro-Russian hacktivist group known as NoName057(16). Dubbed “Operation Eastwood” the collaboration proved highly effective in degrading ...
Analysis
The advent of artificial intelligence has correctly ushered in concerns over its abuse by hostile threat actors to leverage the technology to enhance the speed of their attacks and further advance the efficacy of their ...
Analysis
A recent article intimated that the United States has taken a step back from addressing foreign influence and interference in cyberspace, raising the question if the United States and by extension the West has limited its capabilities ...
Analysis
Recent news reporting indicates that Chinese-sponsored cyber espionage threat actors have been conducting operations against Russia in an attempt to collect sensitive military and defense systems since the Ukraine war began. Researchersfrom a Taiwan cybersecurity company these incursions ...
Analysis
Recently, Microsoft and CrowdStrike are collaborating in order to streamline the naming conventions of state and nonstate cyber activity in an effort to clarify current inconsistencies across the cybersecurity industry’s attribution taxonomies. As anyone involved in cybersecurity knows, ...
Analysis
Recently, Russia signed a joint “International Cooperation in the Field of Information Security” agreement with several authoritarian governments to include but not limited to Belarus, Cuba, Iran, North Korea, and Venezuela. The agreement asserts that ...
Analysis