10 Notable Cyber Attacks on Government Agencies |
System State, Socio-economic & Political Responses |
Governance & Institutions |
2022 |
Mexico is one of the top victims of cyberattacks in Latin America |
System State, System Problems |
Governance & Institutions |
2022 |
U.S. Space Force ramps up cybersecurity spending |
System State, Scientific & Technology Responses |
Conflict & War |
2023 |
US mulls establishing a full fledged Cyber Force to counter China, Russia, Iran and North Korea |
System State, Scientific & Technology Responses |
Conflict & War |
2023 |
The Cyber Defense Matrix |
System State, Scientific & Technology Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
|
China's cyber assault on Taiwan |
System State, Socio-economic & Political Responses |
Cyber-IR, Conflict & War |
2022 |
What it will look like if China launches cyberattacks in the U.S. |
System State, Socio-economic & Political Responses |
Cyber-IR, Conflict & War |
2023 |
10 Notable Cyber Attacks on Government Agencies |
System State, Socio-economic & Political Responses |
Governance & Institutions |
2022 |
Security leaders weigh in on school district ransomware attack |
System State |
Governance & Institutions |
2023 |
Africa in the news: Ethiopia, Nigeria, and internet control updates |
System State, System Problems, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Conflict & War |
2021 |
Why Does the Global Spyware Industry Continue to Thrive? Trends, Explanations, and Responses |
System State, System Problems, Scientific & Technology Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Phase-based Tactical Analysis of Online Operations |
System State, System Problems, Scientific & Technology Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
U.S. Cyber Deterrence: Bringing Offensive Capabilities into the Light |
System State, System Problems, Socio-economic & Political Responses |
Cyber-IR, Conflict & War |
2022 |
Cyber Deterrence: The Past, Present, and Future |
System State |
Cyber-IR, Conflict & War |
2020 |
African Union Bugged by China: Cyber Espionage as Evidence of Strategic Shifts |
System State, System Problems, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2018 |
What Business Needs to Know About the New U.S. Cybersecurity Strategy |
System State, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Technological Change and International Relations |
System State, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2019 |
How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument |
System State, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2017 |
The Three Top Issues to Address for the Global Cybercrime Treaty |
System State, Socio-economic & Political Responses |
Governance & Institutions |
2023 |
The Duality of Cyber Protection: Cybersecurity and (or) Cyber Insurance? |
System State |
Cybersecurity & Sustainability |
2023 |
Understanding Interconnectivity of the Global Undersea Cable Communications Infrastructure and its Implications for International Cyber Security |
System State, Socio-economic & Political Responses |
Cyber-IR |
2014 |
A Shared Responsibility: Public-Private Cooperation for Cybersecurity |
System State |
Governance & Institutions |
2022 |
Data and public-private partnerships are the future of cybersecurity |
System State |
Governance & Institutions |
2023 |
Cyberattack on Critical Infrastructure: Russia and the Ukrainian Power Grid Attacks |
System State |
Conflict & War |
2017 |
Cybersecurity Policies - European Commission |
System State |
Cyber-IR, Governance & Institutions |
2022 |
A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks |
System State |
Governance & Institutions |
2022 |
Edge Security for SIP-enabled IoT Devices with P4 |
System State |
Governance & Institutions, Cybersecurity & Sustainability |
2021 |
Synchronizing DDoS defense at network edge with P4, SDN, and Blockchain |
System State |
Cybersecurity & Sustainability |
2022 |
CYBER DEFENSE ACROSS THE OCEAN FLOOR The Geopolitics of Submarine Cable Security |
System State, System Problems |
Cyber-IR, Governance & Institutions, Conflict & War |
2021 |
The war never ends on the cyber front |
System State, Socio-economic & Political Responses |
Governance & Institutions, Conflict & War |
2022 |
Cybersecurity in space: The out of-this-world challenges ahead |
System State, Scientific & Technology Responses |
Cyber-IR |
2022 |
No-go zones: Ethical geographies of the surveillance industry |
System State, System Problems |
Cyber-IR, Governance & Institutions |
2017 |
Constructing Norms for Global Cybersecurity |
System State, System Problems, Socio-economic & Political Responses |
Cyber-IR, Conflict & War |
2016 |
Pandas with a Soul: Chinese Espionage Attacks Against Southeast Asian Government Entities |
System State, System Problems |
Cybersecurity & Sustainability |
2023 |
Cybersecurity Convergence: Digital Human and National Security |
System State, System Problems |
Cyber-IR, Governance & Institutions |
2020 |
The perilous path to a new cybercrime treaty |
System State, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2023 |
Chinese Hackers Using MgBot Malware to Target International NGOs in Mainland China |
System State |
Conflict & War |
2023 |
Iranian Hackers Launch Sophisticated Attacks Targeting Israel with PowerLess Backdoor |
System State |
Conflict & War |
2023 |
Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets |
System State |
Cyber-IR, Conflict & War |
2023 |
What the Russian Invasion Reveals About the Future of Cyber Warfare |
System State, Scientific & Technology Responses, Socio-economic & Political Responses |
Cyber-IR, Conflict & War |
2022 |
Good practices in innovation on Cybersecurity under the NCSS (National Cyber Security Strategies) |
System State, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2019 |
Cyber Threats How financial institutions can mitigate risk |
System State |
Cybersecurity & Sustainability |
|
Sweden Tests Cyber Defenses as War and NATO Bid Raise Security Risks |
System State |
Cyber-IR, Conflict & War |
2022 |
Nordic Council seeks Deeper Regional Cybersecurity Cooperation |
System State |
Cyber-IR, Conflict & War |
2023 |
Finland Aiming to Add Offensive Edge to Cyberwar Arsenal |
System State |
Cyber-IR, Conflict & War |
2016 |
The Power of Beliefs in US Cyber Strategy: The Evolving Role of Deterrence, Norms, and Escalation |
System State, Socio-economic & Political Responses |
Governance & Institutions |
|
Flicking the kill switch: governments embrace internet shutdowns as a form of control |
System State, Scientific & Technology Responses, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2022 |
Civilians 'Defending Forward' in Cyberspace |
System State |
Governance & Institutions, Cybersecurity & Sustainability |
2019 |
Cybersecurity’s Pearl Harbor Moment: Lessons Learned from the Colonial Pipeline Ransomware Attack |
System State, Scientific & Technology Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2021 |
Military Authorizations in a Connected World: DoD’s Role in Cyber Influence Operations |
System State, Socio-economic & Political Responses |
Cyber-IR, Conflict & War |
2021 |