Quantcast
Channel: Cybersecurity Archives - Strife
Browsing latest articles
Browse All 24 View Live

Image may be NSFW.
Clik here to view.

Cybersecurity in Practice (Part V): Securing the Digital Frontier

By: Cheng Lai Ki ‘Norse Attack Map’ A threat monitoring program developed by cybersecurity firm Kaspersky showing live cyberattacks in real time around the world. The digital-physical divide is...

View Article


Image may be NSFW.
Clik here to view.

Strife Feature, Abstract: A Beginners Guide to the Musical Scales of Cyberwar

By: Jessica “Zhanna” Malekos Smith Musical scales of cyberwar: the graphic of a piano keyboard illustrates how the core principles of the law of war apply to cyberspace In Strife’s long-form feature...

View Article


Image may be NSFW.
Clik here to view.

Strife Feature – A Beginners Guide to the Musical Scales of Cyberwar

By: Jessica “Zhanna” Malekos Smith Musical scales of cyberwar: the graphic of a piano keyboard illustrates how the core principles of the law of war apply to cyberspace Whether you are a cybersecurity...

View Article

Image may be NSFW.
Clik here to view.

The Rise of ‘Digital Nations’

By Cheng Lai Ki The Internet-of-Things (I0T) refers to the dense nexus of sensors and computers built on the hyper-connectivity of the Internet essential for economic development, national security and...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security in the Age of COVID-19: An Interview with Marcus Willett

by Ed Stacey The World Health Organisation has reported a fivefold increase in cyber attacks during COVID-19 (Image credit: Getty Images) On 22 April 2020, Ed Stacey sat down with Marcus Willett to...

View Article


Image may be NSFW.
Clik here to view.

Enhancing Cyber Wargames: The Crucial Role of Informed Games Design

by Amy Ertan and Peadar Callaghan “Risk – Onyx Edition (Ghosts of board games past)” by derekGavey. Licensed under Creative Commons   ‘A game capable of simulating every aspect of war would become...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity from Trump to Biden: a triumph for cybersecurity?

USAF, 2017 – A cyber operator. After what felt like a lengthy and tortuous transition period, Joe Biden became the United States’ 46th president on the 20th January 2021. Whilst some feel relieved and...

View Article

Image may be NSFW.
Clik here to view.

Offensive Cyber Series: Amy Ertan on AI and Military Innovation, Part II

A soldier operates the remote controlled Mark 8 Wheel Barrow Counter IED Robot. Photo Credit: UK Ministry of Defence, licensed under Creative Commons This is part II of Ed Stacey’s interview with Amy...

View Article


Image may be NSFW.
Clik here to view.

Chinese cyber coercion in the Asia-Pacific? Recent cyber operations in South...

Photo by Markus Spiske on Unsplash Writings on Chinese cyber operations tend to focus on cyber espionage and the stealing of state secrets for China’s military modernisation. Comparatively in...

View Article


Image may be NSFW.
Clik here to view.

Economically isolated, North Korea now turns to Cyberspace

North Korean leader Kim Jong-un surrounded by military personnel. Photo Source: Flickr, licensed under Creative Commons. For years, the international community has slapped North Korea with painful...

View Article
Browsing latest articles
Browse All 24 View Live