A formalized cyber agreement between Russia and India is a logical progression for Moscow both in appearance as well as from a practical standpoint. After all, both countries are known for their technological sectors and ...
Analysis
Mandatory security requirements, information handling restrictions, and security accountability are standards all organizations should be able and willing to implement, and which can be supervised by an oversight body like the FTC. It might not ...
Analysis
On November 1, 2021, China’s “Personal Information Protection Law” (PIPL) went into effect. The PIPL protects the personal privacy of Chinese citizens, and perhaps more importantly, mandates that both Chinese and foreign companies that conduct ...
Analysis
The better ransomware gangs persevere because of their ability to adapt to changing times. Conti has chosen a course of action that may ultimately prove its most strategic move yet. By disbanding, Conti removed itself ...
Analysis
On all accounts, it appears that the U.S. government is making a real effort to maintain its advantage in cyberspace. Hunt forward operations have been an innovative practice that has the potential to reduce the ...
Analysis
In May 2022, the Department of Homeland Security (DHS) announced the creation of a Disinformation Governance Board, a new internal working group within DHS with the mission of ensuring these protections are “appropriately incorporated across ...
Analysis
Since the start of Russia’s invasion of Ukraine, the conflict has spilled into cyberspace with state and non-state actors taking sides and conducting a variety of disruptive operations. Russia state actors have executed eight new ...
Analysis
There is every indication that Iran’s government will pass “The Cyberspace Users’ Rights Protection Bill,” a piece of legislation that would introduce alarming changes to how the government can monitor and control Internet use. Iran ...
Analysis
The frequent targeting of India’s energy stakeholders is a disconcerting turn of events and underscores the increasing interest of nation states’ willingness to target critical infrastructure for their own advantage. The ability to initiate a ...
Analysis
The United Nations (UN) General Assembly has agreed to enter a three-year engagement to develop a treaty on international cybercrime. The proposed schedule includes at least six sessions to alternate between New York and Vienna. ...
Analysis