There is nothing new about vulnerabilities when it comes to software, hardware, and firmware, so it is essential that companies demonstrate responsibility and accountability for their prompt disclosure and providing fixes.
Analysis
Recently, the Biden Administration announced the ban of the sale of Kaspersky antivirus software in the United States, citing the company’s “ties” to the Russian government as a potential risk to U.S. national security. The Bureau of Industry ...
Analysis
In the runup to the 2024 U.S. presidential election, much attention has been placed on rampant influence campaigns emerging from U.S. adversaries like China, Iran, and Russia. Over the last decade, fear of influence campaigns has ...
Analysis
There is no doubt that regulation harmonization is much needed especially given the amount of cyber regulation being developed or already on the books, and how it’s being enforced.
Analysis
The United States is making significant progress with respect to cybersecurity, but much of that is federally focused.
Analysis
The weaponization of cyberspace has been a legitimate concern as nation states aggressively build capabilities to project power, retaliate, and become more offensively minded.
Analysis
A recent article revealed that the U.S. National Security Agency (NSA) would try to counter prolific ransomware gangs beyond using cyber responses, and also include psychological warfare into its toolbox.
Analysis
At the RSA cybersecurity conference, the Secretary of State announced the release of the Department’s new International Cyberspace & Digital Policy Strategy whose four goals are to advance economic prosperity; enhance security and address cybercrime; promote human rights, ...
Analysis
Recently, China’s Cybersecurity Industry Alliance (CCIA) published a report in an effort to further expose the suspected hegemonic practices and “bullying” behavior of the United States in cyberspace.
Analysis
In a major April 2024 restructuring of its armed forces, China dissolved its Strategic Support Force (SSF), first created in 2015 and that served as the military’s centralized hub for all cyber operations, as well as ...
Analysis