Cybersecurity in Practice (Part V): Securing the Digital Frontier
By: Cheng Lai Ki ‘Norse Attack Map’ A threat monitoring program developed by cybersecurity firm Kaspersky showing live cyberattacks in real time around the world. The digital-physical divide is...
View ArticleStrife Feature, Abstract: A Beginners Guide to the Musical Scales of Cyberwar
By: Jessica “Zhanna” Malekos Smith Musical scales of cyberwar: the graphic of a piano keyboard illustrates how the core principles of the law of war apply to cyberspace In Strife’s long-form feature...
View ArticleStrife Feature – A Beginners Guide to the Musical Scales of Cyberwar
By: Jessica “Zhanna” Malekos Smith Musical scales of cyberwar: the graphic of a piano keyboard illustrates how the core principles of the law of war apply to cyberspace Whether you are a cybersecurity...
View ArticleThe Rise of ‘Digital Nations’
By Cheng Lai Ki The Internet-of-Things (I0T) refers to the dense nexus of sensors and computers built on the hyper-connectivity of the Internet essential for economic development, national security and...
View ArticleCyber Security in the Age of COVID-19: An Interview with Marcus Willett
by Ed Stacey The World Health Organisation has reported a fivefold increase in cyber attacks during COVID-19 (Image credit: Getty Images) On 22 April 2020, Ed Stacey sat down with Marcus Willett to...
View ArticleEnhancing Cyber Wargames: The Crucial Role of Informed Games Design
by Amy Ertan and Peadar Callaghan “Risk – Onyx Edition (Ghosts of board games past)” by derekGavey. Licensed under Creative Commons ‘A game capable of simulating every aspect of war would become...
View ArticleCybersecurity from Trump to Biden: a triumph for cybersecurity?
USAF, 2017 – A cyber operator. After what felt like a lengthy and tortuous transition period, Joe Biden became the United States’ 46th president on the 20th January 2021. Whilst some feel relieved and...
View ArticleOffensive Cyber Series: Amy Ertan on AI and Military Innovation, Part II
A soldier operates the remote controlled Mark 8 Wheel Barrow Counter IED Robot. Photo Credit: UK Ministry of Defence, licensed under Creative Commons This is part II of Ed Stacey’s interview with Amy...
View ArticleChinese cyber coercion in the Asia-Pacific? Recent cyber operations in South...
Photo by Markus Spiske on Unsplash Writings on Chinese cyber operations tend to focus on cyber espionage and the stealing of state secrets for China’s military modernisation. Comparatively in...
View ArticleEconomically isolated, North Korea now turns to Cyberspace
North Korean leader Kim Jong-un surrounded by military personnel. Photo Source: Flickr, licensed under Creative Commons. For years, the international community has slapped North Korea with painful...
View Article