As was highlighted at the Public-Private Partnerships (PPP) for Defence & Security conference last year, there is a large emphasis on boosting South ...
US President Donald Trump has potentially suggested that the government’s cyber wing of the military used cyber attacks to disable lights and cut power in the Venezuelan capital during its strikes on ...
As the conflict between Israel and Iran ramps up, there is another, silent war taking place between the two nation-states. KIRO Newsradio asked Cristin Flynn Goodwin, a cybersecurity expert who worked ...
In times when digital borders are as critical as physical ones, cyber diplomacy has emerged as a vital geopolitical strategy ...
Artificial intelligence is emerging in every aspect of life, from our daily affairs and interactions to the complexities of warfare. It is revolutionizing the nature of conflict, leading some scholars ...
This article is authored by Soumya Awasthi, fellow, Centre for Security, Strategy and Technology, Observer Research ...
In 2022, amidst the ongoing Russo-Ukrainian conflict, one of the largest cyber attacks fell upon Kyivstar, the largest telecommunications provider in Ukraine, leaving millions without mobile and ...
Recent calls to create a Cyber Force are only the latest response to the U.S. military’s years-long struggle to train and retain talented cyber personnel. In 2019, for example, an instructor at the ...
The puzzle of nuclear deterrence is now further muddied by the emergence of cyber threats and their nebulous role in conflict escalation. As doctrine continues to be shaped, there is the ongoing risk ...
Offensive cyber operations in warfare have long had the potential to be revolutionary but that promise has remained distant, being “much harder to use against targets of strategic significance or to ...
As the U.S. military shapes its research and development investment decisions, it is past time to focus on a long-neglected area of cyber warfare—the minds of our military decision-makers—and ensure ...
Open-source data sources indicate a low number of cyberterrorism incidents, despite widespread concerns about its global prevalence. This raises questions about the true level of cyberterrorism threat ...