Cyber Persistence Theory is a must-read even if it is far from the last word. The authors invoke Thomas Kuhn and his famous concept of “paradigm shift.” They penetratingly describe the structural shift that the information revolution imposes on some aspects of interstate competition
The issue is less that Western observers might have overestimated Russia’s cyber potential in its war on Ukraine, more that they almost certainly underestimate the complexities and frictions which separate intent from execution, intensity from effect.
The most persistent and enduring threats from the cyber domain are best addressed through investments in law enforcement, civil infrastructure, public-private resiliency, and international coalitions—less through military superiority.
It's a strategic set of activities that the Chinese government has done on social media, in a variety of ways, to try to cause noise and drama here in the United States and in Canada about investments in rare earth mining and manufacturing.
In this era of geopolitical competition, Europe believes it offers an approach based upon multilateralism and international solidarity. To convince others of this viable alternative, Europe must better understand perceptions in the Global South and improve its own international standing.
Responsible for 95 percent of international communications and data traffic, submarine cables are the backbone of the digital era. To mitigate security threats, governments must prioritize the security and resilience of this critical infrastructure.
Cryptocurrency industry finance expert Sultan Meghji joined us to discuss losses in the crypto market.
et, as the recent Ukraine crisis and the ongoing nuclear sagas with both North Korea and Iran have made abundantly clear, nuclear weapons have not withered away.
The offices will bring sorely needed coordination, credibility, and resources to tackling major policy issues in the digital age. But creating new bureaus is one thing.
As cryptocurrency has risen to prominence within the past decade, its widespread use has likewise created great potential for exploitation by malicious actors.