By Bernard Barbier, Jean-Louis Gergorin and Admiral Edourd Guillaud “Cyber-coercion” calls for putting together intelligence, protection, international action and retaliation capabilities, three former senior national security officials point out. Op-ed. At the beginning of the year 2020, in a world that was yet to imagine how much it would be…
In a news story on the Norwegian government website published on June 7, 2020, the release of a new report on Nordic cooperation was announced. Last week the Nordic Foreign Ministers received the report "Nordic Foreign and Security Policy 2020: Climate Change, Hybrid & Cyber Threats and Challenges". On 30…
According to a June 4, 2020 article published by the UK Ministry of Defence, a new Cyber Regiment has been launched to protect frontline operations from digital attack. The Ministry of Defence has launched 13th Signal Regiment, a dedicated Cyber Regiment, which will protect vital defence networks at home and on…
Debalina Ghoshal Cyber theft committed by China is not new and the country continues to violate commitment that it had made with the United States that it would not indulge in any cyber thefts. These thefts not only include intellectual properties but also crucial weapon systems to name a few…
In an article published by the Finnish Ministry of Defence on December 5, 2019, the engagement of Finland in the NATO Cyber Coalition 2019 Exercise was highlighted. Finland participated as a partner country in NATO’s Cyber Coalition 2019 exercise. Held in Tartu on 2 to 6 December, the exercise is…
By Flight Lieutenant Bel Scott AIR FORCE has launched a new cyber warfare (CW) workforce specifically selected, trained and prepared to lead a team of technical experts responsible for protecting networks, data and information systems. On October 31, Air Force introduced two new employment categories — cyber warfare officer (CWO)…
The Bletchley story is a fascinating one. But no story within that overall story is more intriguing than that of Tommy Flowers. Here was a man who believed that one could build a programmable computer; and he invested his own money to make this vision happen with very little support…
By Robbin Laird In my discussions at Penten, I learned of a very innovative approach to providing for the security for mobile systems. They have developed an approach which allows the user to connect with a variety of security systems through a very innovative USB device which allows a mobile…