Recent reporting indicates that the Kingdom of Saudi Arabia has been investing substantially in Israeli cyber companies that produce offensive cyber tools and weapons. Per these findings, its presumed that the use of such technology ...
Analysis
There is so much about these cybersecurity bilateral agreements that are not known, as few of the agreements have been fully made public with most known about them coming from public statements. At best, coverage ...
Analysis
The term “splinternet” refers to the increasingly balkanization of the Internet, where the cyber domain is dividing due to a variety of reasons to include but not limited to technology, commerce, nationalism, politics, among others. ...
Analysis
The true expanse of China’s cyber power is visible in the current geopolitical climate that has China at odds with the United States, and the world consumed by an ongoing conflict in Ukraine, as well ...
Analysis
The Department of Homeland Security recently published a joint advisory along with the Federal Bureau of Investigation (FBI) and the Department of Treasury on suspected North Korean state-sponsored ransomware campaign implementing the Maui malware. The ...
Analysis
A recent report revealed several private sector Indian companies that have been involved in using corporate cyber espionage tactics against entities involved in litigation in an effort to influence their outcomes. What started off as ...
Analysis
Recently, the U.S. Senate put forth a bill that would require annual briefings on the relationship between CYBERCOM and the NSA, with concerns being expressed how a dual-hatted leadership impacts either organization. These annual reports ...
Analysis
Recently, the United Nations (UN) Security Council stated that there needed to be more done to counter misinformation and disinformation concerning the UN’s 12 global peacekeeping operations, which have received an increase of attacks on ...
Analysis
Protecting critical infrastructure is an imperative for any government grappling to integrate resilient cybersecurity measures into the assets, systems, and networks that are vital for a nation’s national, economic, and public health and safety security. ...
Analysis
The Ukraine conflict has garnered substantial cyber activity drawing in not only the state cyber assets of both Russia and Ukraine, but sympathizers, volunteers, and non-state hacktivist actors supporting both sides. While much focus has ...
Analysis