POPULARITY
Over the last week the UK has been rocked by allegations that China was responsible for two cyber attacks in recent years – one on the Electoral Commission, where hackers successfully accessed the open register, which has the details of 40 million voters; and a set of attempts to access the emails of a number of China critics within parliament. So what do we know about China's cyber capabilities? What are its goals? And now that the UK knows about these attacks, what should we be doing? Joining Cindy Yu on the podcast today is Nigel Inkster, senior advisor for cyber security and China at the think tank IISS, formerly director of operations and intelligence at MI6, and author of China's Cyber Power, a 2016 book on precisely this question. You can also join Cindy Yu at The Spectator's Chinese wine lunch on June 14th. To find out more and buy tickets, visit spectator.co.uk/chinesewine.
Over the last week the UK has been rocked by allegations that China was responsible for two cyber attacks in recent years – one on the Electoral Commission, where hackers successfully accessed the open register, which has the details of 40 million voters; and a set of attempts to access the emails of a number of China critics within parliament. So what do we know about China's cyber capabilities? What are its goals? And now that the UK knows about these attacks, what should we be doing? Joining me on the podcast today is Nigel Inkster, senior advisor for cyber security and China at the think tank IISS, formerly director of operations and intelligence at MI6, and author of China's Cyber Power, a 2016 book on precisely this question. You can also join Cindy Yu at The Spectator's Chinese wine lunch on June 14th. To find out more and buy tickets, visit spectator.co.uk/chinesewine.
International tensions, proliferating security threats and talk of global conflict have become more common in recent years after decades of relative stability following the end of the Cold War. The rise of a more assertive China and intensifying cyber security threats are among two of the issues Nigel Inkster, formerly of MI6, has highlighted in his recent writings. In his presentation to the IIEA, he focuses on these matters along with the wider geopolitical climate. About the Speaker: Nigel Inkster CMG is Senior Advisor at the International Institute for Strategic Studies and a Director of Geopolitical and Intelligence Analysis at Enodo Economics. Previously, he served as Director of Operations and Intelligence for MI6 and served on the Board of MI6 for seven years. In 2017, Inkster was appointed to the Global Commission on the Stability of Cyberspace, participating in the drafting of its eight norms related to non-aggression in cyberspace. The author of The Great Decoupling: China, America and the Struggle for Technological Supremacy and China's Cyber Power, his lifelong fascination with China started when he studied the language and culture at Oxford.
Free, ungated access to all 265+ episodes of “It's 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. You're welcome to
Episode 34 of the Israel Defense and Diplomacy Forum (IDDF) – with Prof. Chuck Freilich, former Israeli Deputy National Security Advisor, and Benjamin Anthony, Co-Founder & CEO of the Miryam Institute. In this episode, Chuck and Benjamin discuss the pros and cons of a possible US-Israeli defense treaty, a potential side product of the US-Israeli-Saudi normalization deal now under discussion. Chuck describes the conditions under which a treaty such as this would be favorable for Israel, although he is in a minority view among Israeli defense officials, Benjamin leans more towards the majority view, raising concerns about the future deployment of IDF forces abroad. They also briefly touch on the assassination of the head of the Russian Wagner Force, Yevgeny Prigozhin and the first Republican presidential debate. Benjamin expresses concern over GOP candidate Vivek Ramaswamy's call for ending military aid to Israel when the current 10-year package expires in 2028. Chuck shares his deep concern, believing that the relationship with the US is critical to Israel's national security. The two disagree on the background to statements such as Ramaswamy's and similar ones by Democratic candidates. Benjamin attributes this primarily to anti-Semitism, particularly on campus. Chuck to Israel's policies regarding the West Bank.Join us as Chuck and Benjamin agree and disagree, in detail and in-depth, always respectfully, on the critical issues Israel faces.The MirYam Institute. Israel's Future in Israel's Hands.To purchase Chuck's new book, "Israel and the Cyber Threat: How the Startup Nation Became a Global Cyber Power", click here: https://tinyurl.com/2sa4tfurThe MirYam Institute. Israel's Future in Israel's Hands.Follow Chuck:https://www.ChuckFreilich.comFollow The MirYam Institute Twitter: https://bit.ly/3jkeUyxFollow Benjamin Anthony Twitter: https://bit.ly/3hZeOe9Like Benjamin Anthony Facebook: https://bit.ly/333Ct93Like The MirYam Institute Facebook: https://bit.ly/2SarHI3Follow Benjamin Anthony Instagram: https://bit.ly/30m6uPGFollow The MirYam Institute Instagram: https://bit.ly/3l5fvED
Episode 34 of the Israel Defense and Diplomacy Forum (IDDF) – with Prof. Chuck Freilich, former Israeli Deputy National Security Advisor, and Benjamin Anthony, Co-Founder & CEO of the Miryam Institute. In this episode, Chuck and Benjamin discuss the pros and cons of a possible US-Israeli defense treaty, a potential side product of the US-Israeli-Saudi normalization deal now under discussion. Chuck describes the conditions under which a treaty such as this would be favorable for Israel, although he is in a minority view among Israeli defense officials, Benjamin leans more towards the majority view, raising concerns about the future deployment of IDF forces abroad. They also briefly touch on the assassination of the head of the Russian Wagner Force, Yevgeny Prigozhin and the first Republican presidential debate. Benjamin expresses concern over GOP candidate Vivek Ramaswamy's call for ending military aid to Israel when the current 10-year package expires in 2028. Chuck shares his deep concern, believing that the relationship with the US is critical to Israel's national security. The two disagree on the background to statements such as Ramaswamy's and similar ones by Democratic candidates. Benjamin attributes this primarily to anti-Semitism, particularly on campus. Chuck to Israel's policies regarding the West Bank.Join us as Chuck and Benjamin agree and disagree, in detail and in-depth, always respectfully, on the critical issues Israel faces.The MirYam Institute. Israel's Future in Israel's Hands.To purchase Chuck's new book, "Israel and the Cyber Threat: How the Startup Nation Became a Global Cyber Power", click here: https://tinyurl.com/2sa4tfurFollow Chuck:https://www.ChuckFreilich.comFollow The MirYam Institute Twitter: https://bit.ly/3jkeUyxFollow Benjamin Anthony Twitter: https://bit.ly/3hZeOe9Like Benjamin Anthony Facebook: https://bit.ly/333Ct93Like The MirYam Institute Facebook: https://bit.ly/2SarHI3Follow Benjamin Anthony Instagram: https://bit.ly/30m6uPGFollow The MirYam Institute Instagram: https://bit.ly/3l5fvEDSupport the show
Two seemingly different cases, one on first sale valuation the other on substantial transformation, provide the same important lesson – facts drive the law.
Since the start of Russia's war against Ukraine, the world has witnessed unprecedented sanctions against Russia, and military and humanitarian support for Ukraine against a backdrop of ongoing military campaigns and loss of civilian life. In this new Sounds Strategic episode, host Meia Nouwens is joined by Dr Nigel Gould-Davies, Maria Shagina and Franz Stefan-Gady to discuss geopolitical, economic and military takeaways from the past twelve months.Looking ahead, our experts will also share what to watch out for in 2023, and give their views on whether and end to the war this year is likely, from their respective angles of analysis. Host and speakers: Meia Nouwens, Senior Fellow for Chinese Security and Defence Policy; Dr Nigel Gould-Davies, Editor Strategic Survey & Senior Fellow for Russia and Eurasia; Franz Stefan-Gady, Senior Fellow for Cyber Power and Future Conflict; Maria Shagina, Senior Fellow, Diamond-Brown Economic Sanctions, Standards and Strategy; We hope you enjoy listening to the episode. Don't forget to follow, rate and subscribe to Sounds Strategic on wherever you listen to your favourite podcasts. Date of recording: 14 February Sounds Strategic is recorded and produced at the IISS. Hosted on Acast. See acast.com/privacy for more information.
Commander Robert “Jake” Bebber, U.S. Navy, and Lieutenant Commander Tyson B. Meadors, U.S. Navy, share why cyber defense is an essential part of the Great Power Competition.
Taiwan has been at the forefront of geopolitical concern in Asia and beyond, following Nancy Pelosi's visit to Taipei and the string of military exercises conducted by China in early August. Podcast guest host James Crabtree is joined by IISS experts Meia Nouwens, Franz-Stefan Gady and Henry Boyd to discuss the recent developments. Topics the speakers address in this episode: Taiwan's political leadership People's Liberation Army's military exercises around Taiwan Development of capability design and cognitive advantage Potential lessons from Ukraine Impact of disinformation and public perception Emerging technological capabilities Guest host: James Crabtree, Executive Director, IISS–Asia | Twitter: @jamescrabtree | James Crabtree (iiss.org) Meia Nouwens, IISS Senior Fellow for Chinese Defence Policy and Military Modernisation | Twitter: @MeiaNouwens | Meia Nouwens (iiss.org) Franz-Stefan Gady, Senior Fellow for Cyber Power and Future Conflict | Twitter: @HoansSolo | Franz-Stefan Gady (iiss.org) Henry Boyd, Research Fellow for Defence and Military Analysis | Henry Boyd (iiss.org) We hope you enjoy the episode and please follow, rate, and subscribe to Sounds Strategic on the podcast platform of your choice. Date of Recording: 28 September 2022 Sounds Strategic is recorded and produced at the IISS in London. Hosted on Acast. See acast.com/privacy for more information.
Join our host, Diva Joshi, and current Georgetown professor David Fahrenkrug (and former fighter pilot) for a discussion on cyber power.
On this week's Cyber Report, sponsored by Fortress Information Security, Dr. Greg Austin who heads the Cyber Power and Future Conflict program at the International Institute for Strategic Studies in Singapore, discusses Russia's cyber capabilities, Moscow's approach to cyber, US and allied offensive and defensive cyber abilities, how brain drain will undermine Russian information and communications technology, Western efforts to live without Russian labor and Russia's ability to substitute for banned Western technologies, cyber lessons from the Ukraine War, what China is learning from international sanctions on Russia and how Beijing is working hard to avoid running afoul of US export law with Defense & Aerospace Report Editor Vago Muradian.
The Energizer case focusing on an article's pre-determined use when determining origin has vexed numerous importers trying to avoid China section 301 tariffs. The recent Cyber Power decision may indicate that the courts are willing to take a broader view on origin, more aligned with commercial reality.
The complexities of and losses from a shoddily created cyberspace substrate continue to hollow the economies and national power of consolidated democracies. As China rises as a strategically focused and digitally aggressive authoritarian giant, it is critical that democratic leaders both understand the reality they face and how an institutional alternative may be created to avoid being weak cyber powers in the future. This presentation offers two models: the ‘Cybered Conflict' model to lay the foundation explanation for the weakness in national cyber power of democracies, and the ‘Cyber Operational Resilience Alliance (CORA) model to explain how this existentially threatening trend may be turned around through allied action to jointly ensure cyber resilience. Finally the talk will outline very briefly how the CORA model may be used analytically to improve the cyber resilience alliance potential of national cyber strategies, and to identify organizations capable of contributing to more robust collective cyber defenses across sectors and allied democratic nations. About the speaker: With engineering, economics, and comparative complex organization theory/political science degrees, Dr. Chris C. Demchak is the RDML Grace M. Hopper Professor of Cyber Security and a member of the Cyber and Innovation Policy Institute, U.S. Naval War College. In her research on cyberspace as a globally shared insecure complex ‘substrate', Demchak takes a systemic approach to emergent structures, comparative institutional evolution, adversaries' use of systemic cybered tools, virtual worlds/gaming for operationalized organizational learning, and designing systemic resilience against imposed surprise.
The complexities of and losses from a shoddily created cyberspace substrate continue to hollow the economies and national power of consolidated democracies. As China rises as a strategically focused and digitally aggressive authoritarian giant, it is critical that democratic leaders both understand the reality they face and how an institutional alternative may be created to avoid being weak cyber powers in the future. This presentation offers two models: the ‘Cybered Conflict' model to lay the foundation explanation for the weakness in national cyber power of democracies, and the ‘Cyber Operational Resilience Alliance (CORA) model to explain how this existentially threatening trend may be turned around through allied action to jointly ensure cyber resilience. Finally the talk will outline very briefly how the CORA model may be used analytically to improve the cyber resilience alliance potential of national cyber strategies, and to identify organizations capable of contributing to more robust collective cyber defenses across sectors and allied democratic nations.
Read a transcript of this episode on FT.comhttps://www.ft.com/content/402578f3-6ad6-45f8-8340-cb1e809fe95bIn this special interview, Sir Jeremy Fleming, head of the UK signals intelligence agency GCHQ, talks to FT editor Roula Khalaf and FT correspondent Helen Warrell about cyber threats from China and other state actors, the global competition for data and the "Snowden effect" on spy agencies.Clips: IISS, NBC See acast.com/privacy for privacy and opt-out information.
This week in the Security News: LinkedIn breach exposes user data, Why MTTR is Bad for SecOps, 3 Things Every CISO Wishes You Understood, USA as a Cyber Power, is ignorance bliss for hackers, flaws let you hack an ATM by waving your phone, PrintNightmare, Bitcoins from Banks and more! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw701
This week in the Security News: LinkedIn breach exposes user data, Why MTTR is Bad for SecOps, 3 Things Every CISO Wishes You Understood, USA as a Cyber Power, is ignorance bliss for hackers, flaws let you hack an ATM by waving your phone, PrintNightmare, Bitcoins from Banks and more! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw701
This week, we kick off the show with an interview featuring Rob Shavelle, Co-Founder and CEO of Abine & DeleteMe, to talk about New Security Threats Stemming from PII Online! Then, Haseeb Awan, CEO of EFANI Inc, joins to discuss the The Rise of Sim Swapping! In the Security News, LinkedIn breach exposes user data, Why MTTR is Bad for SecOps, 3 Things Every CISO Wishes You Understood, USA as a Cyber Power, is ignorance bliss for hackers?, flaws let you hack an ATM by waving your phone, and more! Show Notes: https://securityweekly.com/psw701 Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we kick off the show with an interview featuring Rob Shavelle, Co-Founder and CEO of Abine & DeleteMe, to talk about New Security Threats Stemming from PII Online! Then, Haseeb Awan, CEO of EFANI Inc, joins to discuss the The Rise of Sim Swapping! In the Security News, LinkedIn breach exposes user data, Why MTTR is Bad for SecOps, 3 Things Every CISO Wishes You Understood, USA as a Cyber Power, is ignorance bliss for hackers?, flaws let you hack an ATM by waving your phone, and more! Show Notes: https://securityweekly.com/psw701 Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
First, we talk to Aashish Aryan about why the government of India has decided to withdraw the 'safe harbour' protection from the microblogging platform, Twitter. Next, Indian Express' Shubhajit Roy joins the show to discuss a recent report that assessed the cyber capabilities of 15 countries including India. (13:20) And finally, we go over the details of Supreme Court's dismissal of an appeal against Delhi HC's order that allowed construction the Central Vista project to carry on. (20:14)
In this episode, Sounds Strategic host Meia Nouwens is joined by Greg Austin, Senior Fellow for Cyber, Space and Future Conflict, and Franz-Stefan Gady, Research Fellow for Cyber, Space and Future Conflict, to discuss the findings of a new IISS report on cyber capabilities and national power. A new report by the IISS has assessed the cyber power of 15 states, placing them into three tiers of capability. Following the launch of this major two-year study, Meia, Greg and Franz-Stefan discuss how to define and measure cyber power and who comes out on top.Meia, Greg and Franz-Stefan discuss the categories used to assess each country's cyber capabilities in the report, including strategy and doctrine, governance, cyber-intelligence capability, cyber security and resilience, global leadership and offensive cyber capability. According to the qualitative framework developed by IISS researchers, the United States is the only country with world-leading strengths in all categories, with China placed in the second tier of cyber powers. Meia, Greg and Franz-Stefan go on to discuss the role of political culture, organisational relationships and governance models in shaping the relationship between cyber capabilities and how they are used by a state actor on the international stage, what we know about the operational activities of the US, Russia and China, how much cyber industrial strength matters, the impact of political stability and instability on the development of cyber capabilities and how middle powers can compete with great powers in cyberspace.We hope you enjoy listening to the episode. Don't forget to follow, rate and subscribe to Sounds Strategic on wherever you listen to your favourite podcasts.Date of recording: 24 June 2021Sounds Strategic is recorded and produced at the IISS in London. See acast.com/privacy for privacy and opt-out information.
The SVR's Nobelium appears to be back, this time with a less-than-fully successful cyberespionage campaign. The Netfilter driver is assessed as malware. Idle hands seem to make for more attacks against online gaming. Mercedes-Benz USA reports a data exposure incident. CISA starts to keep track of bad practices. The International Institute for Strategic Studies publishes a net assessment of national cyber power. Carole Theriault looks at the security implications of frictionless online commerce. Our guest is Clar Rosso from (ISC)2 with insights on Building Resilient Cybersecurity Teams. And Loki is a trickster, and his name is a lousy password. For links to all of today's stories check out our CyberWire daily news briefing: https://www.thecyberwire.com/newsletters/daily-briefing/10/123
In their first joint interview, the director of the UK spy agency GCHQ and the top general in charge of cyber operations for the military talk about how the UK is using the power of cyber to push back against adversaries with the creation of a whole new National Cyber Force.Jeremy Fleming and General Sir Patrick Sanders also reveal new details about how the UK used offensive cyber in the fight against Islamic State, attacking the terrorist group's ability to fly drones, use their mobile phones and spread online propaganda.We also hear from a woman who was once described as the UK's best offensive cyber spy.Sally Walker has since left GCHQ and says she is choosing to speak out – now she's once again a member of the public – to help generate a wider debate about the cyber grey zone.Interviews:Jeremy Fleming, director of GCHQGeneral Sir Patrick Sanders, commander of Strategic CommandSally Walker, cyber expertTobias Elwood, Conservative MP, chair of the defence select committee and former foreign officer and defence ministerCredits:Written and narrated by Deborah Haynes Edited and produced by Chris ScottProduction support from Michael GreenfieldThe head of Sky News Radio is Dave Terris
States, criminals and terrorists all use cyber to attack each other in the grey zone. It puts anyone with a computer in the firing line, but also means that anyone who understands computers has the ability to fight back.This episode explores a range of cyber threats from espionage up to attacks that cause physical harm, such as by targeting hospitals or electricity supplies.Sky News journalist Deborah Haynes also speaks to a young computer expert called Marcus Hutchins who helped to stop one of the worst known cyber attacks to hit the UK.The National Health Service was one of the main victims of the May 2017 WannaCry attack, blamed on North Korea. Pyongyang has denied involvement.Interviews:Ciaran Martin, former chief executive of the National Cyber Security CentrePaul Chichester, director of operations at the National Cyber Security CentreMarietje Schaake, international director of policy at Stanford's Cyber Policy CentreHarold Thimbleby, professor of computer science at Swansea UniversityMarcus Hutchins, computer security expertCredits:Written and narrated by Deborah Haynes Edited and produced by Chris ScottProduction support from Sophia McBride and Michael GreenfieldThe head of Sky News Radio is Dave Terris
In this episode, we talk to Julia Voo, one of the authors of the newly published National Cyber Power Index 2020. Which country is the most powerful in cyberspace? The NCPI takes a "whole of country" approach to measuring cyber power, ranking 30 countries in the context of seven national objectives. Voo is a Cyber Fellow at the Belfer Center for Science and International Affairs at the Harvard Kennedy School. She was the closing keynote at the SecureWorld Detroit-Toronto-Cincinnati virtual conference, and this is an excerpt from her presentation and fireside chat. Resource Links: • Julia Voo on LinkedIn: https://www.linkedin.com/in/juliavoo/ • The National Cyber Power Index 2020 report (PDF): https://www.belfercenter.org/publication/national-cyber-power-index-2020 • Trend Micro Cyber Risk Index: https://www.trendmicro.com/en_us/security-intelligence/breaking-news/cyber-risk-index.html • SecureWorld VIRTUAL conferences: https://www.secureworldexpo.com/events The SecureWorld Sessions podcast gives you access to people and ideas that impact your cybersecurity career and help you secure your organization.
Tim Watts MP, Shadow Assistant Minister for Communications & Cyber Security, comments on the Cyber Power Index released by Harvard’s Belfer Center which shows Australia is ranked 8th for intent but 16th for capability overall. According to Tim, the report highlights significant gaps in Australia’s capabilities on a range of objectives including offence and commercialisation and is further confirmation the Morrison Government has over-promised and never delivered on almost every metric when it comes to Australia’s cyber security capabilities. We also discuss the contrasts of existing Federal Government structure for cyber versus the shadow portfolio structure and observations on the Australian Cyber Security Strategy and Cybersecurity for IoT Devices Code of Practice. In terms of funding, an alternative Labour Government is continuing to develop its policy framework for the 2022 election. Recorded 14 September 2020. Belfer Center report: https://www.belfercenter.org/sites/default/files/2020-09/NCPI_2020.pdf National Cyber Resilience discussion paper: https://www.timwatts.net.au/news/discussion-papers/national-cyber-resilience-is-australia-ready-for-a-computer-covid-19/ In his release, Tim Watts MP stated: The Morrison Government’s report card on cyber is in – showing Australia is ranked 8th for cyber intent but 16th for actual capability – behind Estonia, Israel, and Malaysia. The newly-released analysis is done by the Harvard Kennedy School’s Belfer Center in its National Cyber Power Index 2020. Under the Morrison Government, Australia has dropped from 3rd in a 2011 ranking to 10th overall in this study. This is yet another example of the Morrison Government’s approach of rhetoric over action and their failure to prioritise cyber at both an industry and government level. According to the report, the biggest gap between intent and capability is in our offence, with Australia placing 10th in intent yet only 24th in capability – particularly lagging in the capability of our domestic industry to realise high-tech export opportunities. Australia ranks 12th for the commercialisation of cyber security capability compared to 8th on intent which is particular concerning given the omission of any objectives or initiatives to support the Australian cyber security industry in the Government’s delayed 2020 Cyber Security Strategy, This report is further confirmation the Morrison Government has overpromised and never delivered on almost every metric when it comes to Australia’s cyber security capabilities. PROFILE Tim Watts is the Federal Labor Member for Gellibrand. Tim has worked in the IT and telecommunications sector for the better part of a decade, as a Senior Manager at Telstra and a Solicitor at Mallesons Stephen Jaques. He has a Bachelor of Laws (Hons) from Bond University, Master of Public Policy from Monash University and Master of Politics and Communication from the London School of Economics. Since being elected, Tim has been an active advocate on issues ranging from family violence, Australian aid, cyber security, refugee and asylum policy, cycling and Australia's engagement with Asia. While Tim’s ancestors arrived in Australia in the 1840s, his wife arrived in Australia from Hong Kong in the 1980s. In this way, Tim’s children are at once both second and sixth generation Australians. As a result, Tim is passionate about protecting the harmonious multicultural society in which we live and understands the specific needs of our multicultural communities.
New Zealand stock exchange halted by cyber-attackChina may be the world's leading cyber powerA Chrome feature is creating enormous load on global root DNS serversElon Musk confirms Tesla was the target of a foiled ransomware attackA vulnerability tsunami is overwhelming security teamsThere's a big hurricane headed toward Texas, and it's a nightmare forecastGoogle's own engineers said the company 'confuses users' on privacy settings that are now the subject of a lawsuitTensions between Apple and Facebook may affect the ad targeting businessRedefining what CISO success looks likeChief Availability Officer of Salesforce Darryn Dieken on availability, reliability and the challenges organizations are facing. Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Darryn Dieken Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: bit.ly/salesforceforservice securityscorecard.com/twit Wasabi.com offer code ENTERPRISE
New Zealand stock exchange halted by cyber-attackChina may be the world's leading cyber powerA Chrome feature is creating enormous load on global root DNS serversElon Musk confirms Tesla was the target of a foiled ransomware attackA vulnerability tsunami is overwhelming security teamsThere's a big hurricane headed toward Texas, and it's a nightmare forecastGoogle's own engineers said the company 'confuses users' on privacy settings that are now the subject of a lawsuitTensions between Apple and Facebook may affect the ad targeting businessRedefining what CISO success looks likeChief Availability Officer of Salesforce Darryn Dieken on availability, reliability and the challenges organizations are facing. Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Darryn Dieken Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: bit.ly/salesforceforservice securityscorecard.com/twit Wasabi.com offer code ENTERPRISE
New Zealand stock exchange halted by cyber-attackChina may be the world's leading cyber powerA Chrome feature is creating enormous load on global root DNS serversElon Musk confirms Tesla was the target of a foiled ransomware attackA vulnerability tsunami is overwhelming security teamsThere's a big hurricane headed toward Texas, and it's a nightmare forecastGoogle's own engineers said the company 'confuses users' on privacy settings that are now the subject of a lawsuitTensions between Apple and Facebook may affect the ad targeting businessRedefining what CISO success looks likeChief Availability Officer of Salesforce Darryn Dieken on availability, reliability and the challenges organizations are facing. Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Darryn Dieken Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: bit.ly/salesforceforservice securityscorecard.com/twit Wasabi.com offer code ENTERPRISE
New Zealand stock exchange halted by cyber-attackChina may be the world's leading cyber powerA Chrome feature is creating enormous load on global root DNS serversElon Musk confirms Tesla was the target of a foiled ransomware attackA vulnerability tsunami is overwhelming security teamsThere's a big hurricane headed toward Texas, and it's a nightmare forecastGoogle's own engineers said the company 'confuses users' on privacy settings that are now the subject of a lawsuitTensions between Apple and Facebook may affect the ad targeting businessRedefining what CISO success looks likeChief Availability Officer of Salesforce Darryn Dieken on availability, reliability and the challenges organizations are facing. Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Darryn Dieken Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: bit.ly/salesforceforservice securityscorecard.com/twit Wasabi.com offer code ENTERPRISE
New Zealand stock exchange halted by cyber-attackChina may be the world's leading cyber powerA Chrome feature is creating enormous load on global root DNS serversElon Musk confirms Tesla was the target of a foiled ransomware attackA vulnerability tsunami is overwhelming security teamsThere's a big hurricane headed toward Texas, and it's a nightmare forecastGoogle's own engineers said the company 'confuses users' on privacy settings that are now the subject of a lawsuitTensions between Apple and Facebook may affect the ad targeting businessRedefining what CISO success looks likeChief Availability Officer of Salesforce Darryn Dieken on availability, reliability and the challenges organizations are facing. Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Darryn Dieken Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: bit.ly/salesforceforservice securityscorecard.com/twit Wasabi.com offer code ENTERPRISE
New Zealand stock exchange halted by cyber-attackChina may be the world's leading cyber powerA Chrome feature is creating enormous load on global root DNS serversElon Musk confirms Tesla was the target of a foiled ransomware attackA vulnerability tsunami is overwhelming security teamsThere's a big hurricane headed toward Texas, and it's a nightmare forecastGoogle's own engineers said the company 'confuses users' on privacy settings that are now the subject of a lawsuitTensions between Apple and Facebook may affect the ad targeting businessRedefining what CISO success looks likeChief Availability Officer of Salesforce Darryn Dieken on availability, reliability and the challenges organizations are facing. Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Darryn Dieken Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: bit.ly/salesforceforservice securityscorecard.com/twit Wasabi.com offer code ENTERPRISE
New Zealand stock exchange halted by cyber-attackChina may be the world's leading cyber powerA Chrome feature is creating enormous load on global root DNS serversElon Musk confirms Tesla was the target of a foiled ransomware attackA vulnerability tsunami is overwhelming security teamsThere's a big hurricane headed toward Texas, and it's a nightmare forecastGoogle's own engineers said the company 'confuses users' on privacy settings that are now the subject of a lawsuitTensions between Apple and Facebook may affect the ad targeting businessRedefining what CISO success looks likeChief Availability Officer of Salesforce Darryn Dieken on availability, reliability and the challenges organizations are facing. Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Darryn Dieken Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: bit.ly/salesforceforservice securityscorecard.com/twit Wasabi.com offer code ENTERPRISE
New Zealand stock exchange halted by cyber-attackChina may be the world's leading cyber powerA Chrome feature is creating enormous load on global root DNS serversElon Musk confirms Tesla was the target of a foiled ransomware attackA vulnerability tsunami is overwhelming security teamsThere's a big hurricane headed toward Texas, and it's a nightmare forecastGoogle's own engineers said the company 'confuses users' on privacy settings that are now the subject of a lawsuitTensions between Apple and Facebook may affect the ad targeting businessRedefining what CISO success looks likeChief Availability Officer of Salesforce Darryn Dieken on availability, reliability and the challenges organizations are facing. Hosts: Louis Maresca, Brian Chee, and Curt Franklin Guest: Darryn Dieken Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Sponsors: bit.ly/salesforceforservice securityscorecard.com/twit Wasabi.com offer code ENTERPRISE
Recorded June 2, 2020, 11AM PST Jacquelyn Schneider And Herb Lin Discuss Cyber Power And Peril In the Post-COVID World. The Hoover Institution presents an online virtual briefing series on pressing policy issues, including health care, the economy, democratic governance, and national security. Briefings will include thoughtful and informed analysis from our top scholars. ABOUT THE FELLOWS Jacquelyn Schneider is a Fellow at the Hoover Institution, a senior policy advisor to the Cyberspace Solarium Commission, and a non-resident fellow at the Naval War College's Cyber and Innovation Policy Institute. She is an active member of the defense policy community with previous positions at the Center for a New American Security and the RAND Corporation. Before beginning her academic career, she spent six years as an Air Force officer in South Korea and Japan and is currently a reservist assigned to US Cyber Command. In 2018, she was included in CyberScoop's Leet List of influential cyber experts. Dr. Herb Lin is Hank J. Holland Fellow in Cyber Policy and Security at the Hoover Institution and senior research scholar for cyber policy and security at the Center for International Security and Cooperation, both at Stanford University. His research interests relate broadly to policy-related dimensions of cybersecurity and cyberspace, and he is particularly interested in the use of offensive operations in cyberspace as instruments of national policy and in the security dimensions of information warfare and influence operations on national security. To receive notifications about upcoming briefings, please sign up by clicking here: http://eepurl.com/gXjSSb.
Episode 291: ControlTalk NOW — Smart Buildings Videocast and PodCast for week ending Nov 11, 2018 is one of our most exciting and anticipated CTN’s of the year, as we announce the finalists for the 2018 ControlTrends Awards! Congratulations to all of the nominees and all of the finalists! We thank our ControlTrends Community for the largest nomination phase engagement ever, with participation from over 40 countries. Our sincere apologies to Cyber Power and Therese Sullivan, who both made the finals and were not announced on the broadcast (due to Eric’s poor eyesight). Cyber Power made the finals for Peripheral Vendor of the Year and Innovative Wireless Product Solution of the Year. Therese Sullivan was recognized as a finalist for the ControlTrends Women of the Year. Finally, very special thanks to all of our sponsors! Now, the final voting phase begins. Please use this link to cast your vote — and make sure to pass this voting link along to your colleagues and communities to vote as well. We look forward to seeing you January 13th, 2019, in Atlanta. Our other posts this week include: Siemens RDS 110 — Smartest Thermostat Yet; 2018 Honeywell Momentum Voice of Customer Wrap-Up; Project Haystack Announces Sponsors of the 2019 Haystack Connect Conference; and Learn How to Protect Your Facilities from Network Security Breaches webinar from IoTium. Congratulations to all of the finalists! We thank our ControlTrends Community for the largest nomination engagement ever, with participation from over 40 countries. And, very special thanks to all of our sponsors! Now, the final voting phase begins. Please use this link to cast your vote — and make sure to pass this voting link along to your colleagues and communities to vote as well. We look forward to seeing you January 13th, 2019, in Atlanta. Siemens RDS110 — Smartest Thermostat Yet — 6 Powerful and Accurate On-board Sensors. Understanding your needs with smartness! The Siemens Smart RDS110 Thermostat has been developed to provide professional control and operation of heating applications. With its clean design it fits perfectly into every interior. It is always in touch with its surroundings thanks to six powerful and accurate sensors: temperature, humidity, light, proximity, presence and organic particle detection. 2018 Honeywell Momentum Voice of Customer Wrap-Up! ControlTrends closes its video coverage of the 2018 Honeywell Momentum Event with a Voice of Customer wrap-up with Mike Schwan, Regional Manager and Rob Thompson, Technical Services Manager, Total Controls, a division of RSD, and Pat Marsala, President M & M Controls, and Jeff Ashe, Vice President, Electrical Automation Services, provide an in-depth recap of the 2018 Honeywell Momentum. Project Haystack Announces Sponsors of the 2019 Haystack Connect Conference. Project Haystack (https://www.project-haystack.org), a 501(c) non-profit organization focused on developing common standards to streamline the interchange and interoperability of data among IoT devices, smart equipment and systems, today announced the first nine sponsors of Haystack Connect 2019 are J2 Innovations, Key2Act. Bueno Systems, Conserve It, KMC Controls, SkyFoundry, Lynxspring, Automated Buildings and Memoori Research. Learn How to Protect Your Facilities from Network Security Breaches. Attend this webcast and learn how to determine who is on your network, and what they’re doing there. Review strategies to control. monitor, manage and audit all vendor access to critical systems across a building portfolio, and protect a facility’s data, infrastructure, and assets from cyber attacks. The post Episode 291: ControlTalk NOW — Smart Buildings Videocast and PodCast for Week Ending Nov 11, 2018 appeared first on ControlTrends.
In today's podcast we hear that the US Intelligence Community remains convinced the Bears are up to no good. Finland experienced elevated rates of cyberattack during the Helsinki summit, mostly Chinese espionage. The hacker "Anarchy" assembled an 18,000-member botnet in less than a day, using known vulnerabilities. Crooks monetize stolen credit cards through online games. Amazon works to induce better AWS configurations. Annual UK report on Huawei is out. Phishing campaign notes. Zulfikar Ranzan from RSA on cyber risk quantification. Guest is Mark Peters II, author of the book Cashing in on Cyber Power. For links to all of today's stories, check out our CyberWire daily news brief. https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_20.html
Brandon Valeriano examines cyber strategies in their varying forms through quantitative analysis and questions their level of impact This project examines the changing character of cyber strategies in the digital domain. We develop a theory that cyber operations are a form of covert coercion typically seeking to send ambiguous signals or demonstrate resolve. Cyber Coercion from this perspective is neither as revolutionary nor as novel as it seems when evaluated with evidence. We examine cyber strategies in their varying forms through quantitative analysis, finding that cyber disruptions, short-term and long-term espionage, and degradation operations all usually fail to produce political concessions. When states do compel a rival, which is measured as a change in behaviour in the target that is strategically advantageous to the initiator, the cyber operation tends to occur alongside more traditional coercive instruments such as diplomatic pressure, economic sanctions, and military threats and displays. Our findings suggest that before we develop recommendations for sound foreign policy responses to state-backed cyber intrusions or craft international frameworks that constrain the proliferation of politically-motivated malware, we should theoretically and empirically investigate cyber strategies and their efficacy. Brandon Valeriano is the Donald Bren Chair of Armed Conflict at the Marine Corps University. He has published five books and dozens of articles. His two most recent books are Cyber War versus Cyber Reality (2015) and Cyber Strategy (2018), both with Oxford University Press. Ongoing research explores cyber coercion, biological examinations of cyber threat, repression in cyberspace, and the influence of video games on foreign policy outlooks.
Brandon Valeriano examines cyber strategies in their varying forms through quantitative analysis and questions their level of impact This project examines the changing character of cyber strategies in the digital domain. We develop a theory that cyber operations are a form of covert coercion typically seeking to send ambiguous signals or demonstrate resolve. Cyber Coercion from this perspective is neither as revolutionary nor as novel as it seems when evaluated with evidence. We examine cyber strategies in their varying forms through quantitative analysis, finding that cyber disruptions, short-term and long-term espionage, and degradation operations all usually fail to produce political concessions. When states do compel a rival, which is measured as a change in behaviour in the target that is strategically advantageous to the initiator, the cyber operation tends to occur alongside more traditional coercive instruments such as diplomatic pressure, economic sanctions, and military threats and displays. Our findings suggest that before we develop recommendations for sound foreign policy responses to state-backed cyber intrusions or craft international frameworks that constrain the proliferation of politically-motivated malware, we should theoretically and empirically investigate cyber strategies and their efficacy. Brandon Valeriano is the Donald Bren Chair of Armed Conflict at the Marine Corps University. He has published five books and dozens of articles. His two most recent books are Cyber War versus Cyber Reality (2015) and Cyber Strategy (2018), both with Oxford University Press. Ongoing research explores cyber coercion, biological examinations of cyber threat, repression in cyberspace, and the influence of video games on foreign policy outlooks.
Description Cyber operations are becoming increasingly important in contemporary statecraft, as they provide new means through which states may threaten or act against one another. The cases of Estonia, Saudi Aradia, Iran, and the 2016 US Presidential elections demonstrate that cyber operations can be used to compromise critical infrastructure, damage economies, undermine democracy, and can even amount to formal state conflict. However, according to Dr. Brandon Valeriano, "cyberconflict", defined as the use of computational means for malicious or destructive purposes in order to influence diplomatic or military interactions, has not necessarily opened a door to new conflicts in the international system. His research also provides that cyberconflict is neither as frequent or damaging as other forms of conflict. How does cyberconflict fit into the continuation of international rivalries and conflicts today? In this edition of the War Studies Podcast, we are going to dive into the domain of Cyberconflict with Dr. Brandon Valeriano, the Donald Ben Chair of Armed Politics at the Marine Corps University, and Dr. Tim Stevens, Lecturer in Global Security in the Dept. of War Studies and Convenor of the Cyber Security Research Group. If you are interested in learning more about this topic, check out our recording of Dr. Brandon Valeriano's lecture, "Cyber Strategy: The Evolution of Cyber Power and Coercion."
Speaker: Dr Brandon Valeriano, Donald Bren Chair of Armed Politics, Marine Corps University Chair: Dr Tim Stevens, Lecturer in Global Security and Convenor, Cyber Security Research Group Description: Dr Valeriano will discuss the development of strategy in the cyber domain, particularly the coercive potential of cyber operations, which are neither as novel nor as effective as often claimed. His research suggests that cyber operations usually fail to produce political concessions. When states achieve strategic outcomes through cyber means, these operations occur alongside traditional coercive instruments like diplomacy, sanctions and military threats. This suggests that foreign policy and diplomacy aimed at countering strategic cyber threats needs to take proper account of the coercive aspects of cyber operations, rather than being developed in a strategic vacuum. Biography: Brandon Valeriano is the Donald Bren Chair of Armed Politics at the Marine Corps University. He has published widely on cybersecurity and statecraft, including Cyber War versus Cyber Reality (2015) and Cyber Strategy (2018), both with Oxford University Press. Dr. Valeriano is Cyber Security Senior Fellow at the Niskanen Center and Senior (Non-resident) Fellow at the Atlantic Council. ____________________ Hosted by the Cyber Security Research Group.
Event recorded on 12/04/2018 Senior Colonel Zhou Bo is a Senior Colonel in the Chinese PLA and Director of the Center for Security Cooperation at the Office for International Military Cooperation in China’s Ministry of National Defence. Currently, his responsibility is multilateral cooperation which includes peacekeeping, counter-piracy, counter-terrorism and various security-related institutions in the Asia-Pacific. He spoke on the subject of ‘Protecting China’s Interests, Shouldering International Obligations: The Current and Future Role of the Chinese Armed Forces.’ Upcoming events: Cyber Strategy: The Evolution of Cyber Power and Coercion 2 May 2018, 17:00 to 18:30 Pageantry and Representation in the late-Henrician Navy 10 May 2018, 17:15 to 19:00 Inaugural Lecture: Professor John Bew 22 May 2018, 18:00 to 21:00 Wargaming Future Conflict between NATO and Russia 31 May 2018, 15:30 to 17:30 Understanding Complex Conflicts 13 June 2018, 13:00 to 18:30 Follow this link to access all of our upcoming events and RSVP: https://www.kcl.ac.uk/sspp/departments/warstudies/events/index.aspx
Cyber Power talks to us about their products and how they are different from other power companies.
Over the past decade, the Advanced Persistent Threat (APT) has risen to forefront of cybersecurity threats. APTs are a major contributor to the billions of dollars lost by corporations around the world annually. The threat is significant enough that the Navy Cyber Power 2020 plan identified them as a “must mitigate” threat in order to ensure the security of its warfighting network. This presentation and its related research applies the science of Natural Language Processing Open Source Intelligence in order to build an open source Ontology in the APT domain.
Though cyber-security seems to be a the nation's forefront, it's cyber-power that could portend the true dominant players in global and economic affairs for decades. Will the two issues morph into one?