One of the first jetliners after the Second World War was the British made Comet. It was a symbol of the post war era, and a new way of seeing the world after the Blitz and over a decade of an economy that focused purely on need as opposed to any sort of luxury. The […]
Cybercrime-as-a-Service opens up a realm of worrying new possibilities for opportunistic individuals and ideologically motivated groups, as well as a new front for law enforcement and security services to secure. As early as 2013, cybersecurity experts noted that Cybercrime-as-a-Service (CaaS) was a burgeoning business. It is an industry as straightforward as it sounds – professional cybercriminals […]
As sectors of the domestic and world economy become more dependent on the internet and the cloud, their vulnerability to new forms of attack and disruption increases. Cybersecurity is not just a national defense issue, but must also become a cost of doing business. It is clear that the shipping industry is susceptible to cyber-attacks. […]
Cybersecurity threats range from Russia’s influence on the U.S. elections to the ongoing theft by China of industrial intellectual property and North Korea’s attacks on U.S. media.
Africa is becoming a hotbed for technology, shifting again the conventional wisdom on the continent and redefining its business environment and politics.
U.S. lawmakers are concerned about the lack of preparation for a possible long term power outage caused by a cyber-attack against the energy sector.
China and Russia are trying to establish a system of their own for internet governance as an alternative to the “hegemonic” Western system they fear.
Whether the threat of sanctions and loss of face will deter actual behavior of the complex organization we summarize as “China” remains to be seen.
In the past, scholars tended to believe that the internet was an effective tool to challenge authoritarian regimes and facilitate the development of civil society. However, as an expert that has been investigating the issue for a number of years, I disagree with this widely held belief.
Last week, Twitter announced that it suspended 125,000 accounts since mid-2015 suspected of “threatening or promoting terrorist acts, primarily related to ISIS.”
How does technology transform traditional foreign affairs? Let’s take a closer look at five of the most tenacious challenges.
Since 2013, cyber has been ranked ahead of terrorism and named the #1 security threat to the U.S. The understanding of, and bridging of this gap is one of the major issues facing this nation and the rest of the world today.
Popular from Press