Security Experts:

long dotted


There are hopes that HR1 will provide a bipartisan template for a future bill to improve the security of American elections. [Read More]
National Guard soldiers from Colorado, North Dakota, South Dakota and Utah are deploying to Fort Meade, Maryland, as part of a cyber protection team supporting U.S. military operations in Afghanistan. [Read More]
Industry professionals comment on the decision of the United States to indict Chinese government hackers over APT10 attacks. [Read More]
The US, UK, Australia, Canada, New Zealand and Japan have officially accused China of sponsoring the attacks of the APT10 hacker group against MSPs and other organizations around the world. [Read More]
Researchers continue to analyze Shamoon 3 and they have found links to APT33, additional components, and a verse from the Quran in the source code of the wiper. [Read More]
Over a dozen Russian operatives sanctioned by U.S. Treasury Department over their role in election interference and hacking the World Anti-Doping Agency. [Read More]
The Russia-linked cyber-espionage group Sofacy has developed a new version of the Zebrocy tool using the Go programming language. [Read More]
Huawei defends its global ambitions and network security in the face of Western fears that the Chinese telecom giant could serve as a Trojan horse for Beijing's security apparatus. [Read More]
A Czech cyber-security agency on Monday warned against using the software and hardware of China's Huawei and ZTE companies, saying they posed a threat to state security. [Read More]
While investigating a flaw that exposed phone number country codes and account locking information, Twitter discovered an attack coming from IPs possibly linked to state-sponsored actors. [Read More]

FEATURES, INSIGHTS // Cyberwarfare

rss icon

Justin Fier's picture
Against the ongoing backdrop of cyber conflict between nation states and escalating warnings from the Department of Homeland Security, critical infrastructure is becoming a central target for threat actors.
Galina Antova's picture
We must recognize industrial cyberattacks as tactics in a new form of “economic warfare” being waged between nation-states to gain economic and political advantage without having to pay the price of open combat.
Oliver Rochford's picture
The lifting of certain sanctions may provide an alternative incentive to limit certain types of cyberwar activity.
Josh Lefkowitz's picture
It’s critical to recognize that there will always be virtual ways in which terrorists and other criminals can create threats that no border process or physical security program can stop.
Ryan Naraine's picture
Thomas Rid, Professor in the Department of War Studies at King’s College London, joins the podcast to discuss the lack of nuance in the crypto debate and the future of global cyber conflict.
James McFarlin's picture
If there were any lingering doubts that cybersecurity is a geopolitical issue with global implications, such opinions were cast on the rocks by discussions this past week at the 2015 World Economic Forum in Davos, Switzerland.
James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
James McFarlin's picture
Does a dangerous threat lie with ISIS’s possible use of cyber weapons against American critical infrastructure, financial system or other targets? Will such attacks be attempted and do the capabilities exist within ISIS to do so?
James McFarlin's picture
Creative disruption, where a paradigm shift in thinking replaces an existing order, may be an elusive concept but its power as a driving force of human behavior cannot be denied.
James McFarlin's picture
One can only hope our nation’s alarm clocks wake up and stir our national leaders’ imaginations before a cyber incident of the magnitude of 9/11 results in the need for a “Cyber Strikes Commission Report.”