Lies, Damn Lies, and Statistics: Understanding the 2013 Verizon DBIR
By David Grebe Every year, Verizon publishes the Data Breach Investigations Report (DBIR). This report, while far from perfect, gives us a glimpse into the state of the field, and allows us to...
View ArticleThe problem with curtains
By Andreas Haggman: Arend van Dam cartoon, respectfully modified by the Webmaster, Strife Edward Snowden’s revelations have prompted fierce debates in both the intelligence world and the cyber domain...
View ArticleCall for papers: A world in flux? Analysis and prospects for the U.S. in...
A world in flux? Analysis and prospects for the U.S. in global security Call for papers US Foreign Policy Research Group and Strife first annual conference March 4, 2015 at King’s College London The...
View ArticleSurveillance, bulk data collection and intelligence. Interview with Bruce...
Bruce Schneier is an internationally renowned security technologist and the author of 13 books — including “Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World” — as well...
View ArticleReview: “Data and Goliath: The Hidden Battles to Collect Your Data and...
By: Christy Quinn: Bruce Schneier, Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World. New York, NY: W.W. Norton., 2015. Pp. 400. £ 17.99, ISBN: 978-0-393-24481-6. If...
View ArticleCyber risks to governance, Part II – The Attribution Game: the challenges and...
By Yuji Develle and Jackson Webster: In an era of Snowden, Wikileaks, Dark Web and data breaches there have never been so many cyber risks associated with governance. This article is the second of a...
View ArticleCyber risks to governance, Part III: Hyper-connectivity and its impact on...
By: Christy Quinn In an era of Snowden, Wikileaks, Dark Web and data breaches there have never been so many cyber risks associated with governance. This article is the third of a 3-part Strife series...
View ArticleFilm Review: Zero Days (2016)
Gibney, A. Zero Days, Jigsaw Productions, (2016). (PG-13) More information from: http://gb.imdb.com/title/tt5446858/. By: Cheng Lai Ki “The science fiction cyberwar scenario is here…” This statement...
View ArticleBrainjacking: The uncomfortable truth of bio-technology
By: Cheng Lai Ki Modular Prosthetic Limb (MPL) was developed as part of a four-year program by the Johns Hopkins Applied Physics Laboratory, along with Walter Reed National Military Medical Center and...
View ArticleCybersecurity in Practice (Introduction): Outside the Mainstream
By: Cheng Lai Ki ‘In theory, theory and practice are the same. In practice, they are not.’ – Anonymous (not the hacktivist group) Over the last century, human experiences have progressively benefited...
View ArticleCybersecurity In Practice (Part I): Software Power
By Marcelo A. O. Malagutti[1] Software increases its importance on a daily basis. Could it come to affect the balance of power among nations? ‘Might an army of software wizards use insidious electronic...
View ArticleCybersecurity in Practice (Part II): Cybersecurity of Unmanned Autonomous...
By: Arthur Laudrain Thales’ Stratobus – autonomous stratospheric platform between a drone and a satellite The resilience of aerial and space platforms are not the first issue that oomes to mind when...
View ArticleCybersecurity in Practice (Part III): PWNED Maritime Systems
By: Cheng Lai Ki Internet based Maritime Traffic Map detailing the positions of types of vessels off the coast of the United Kingdom Russian cybersecurity firm Kaspersky suggested in a May 2015 report...
View ArticleCybersecurity in Practice (Part IV): Realities and Importance of effective...
By: Nicolas Castellon Photo of a server room that allows for seamless storage and control of data. We are now witnessing the beginning of the digital age. In the last couple of years, we have witnessed...
View ArticleCybersecurity in Practice (Part V): Securing the Digital Frontier
By: Cheng Lai Ki ‘Norse Attack Map’ A threat monitoring program developed by cybersecurity firm Kaspersky showing live cyberattacks in real time around the world. The digital-physical divide is...
View ArticleStrife Feature, Abstract: A Beginners Guide to the Musical Scales of Cyberwar
By: Jessica “Zhanna” Malekos Smith Musical scales of cyberwar: the graphic of a piano keyboard illustrates how the core principles of the law of war apply to cyberspace In Strife’s long-form feature...
View ArticleStrife Feature – A Beginners Guide to the Musical Scales of Cyberwar
By: Jessica “Zhanna” Malekos Smith Musical scales of cyberwar: the graphic of a piano keyboard illustrates how the core principles of the law of war apply to cyberspace Whether you are a cybersecurity...
View ArticleThe Rise of ‘Digital Nations’
By Cheng Lai Ki The Internet-of-Things (I0T) refers to the dense nexus of sensors and computers built on the hyper-connectivity of the Internet essential for economic development, national security and...
View ArticleCyber Security in the Age of COVID-19: An Interview with Marcus Willett
by Ed Stacey The World Health Organisation has reported a fivefold increase in cyber attacks during COVID-19 (Image credit: Getty Images) On 22 April 2020, Ed Stacey sat down with Marcus Willett to...
View ArticleEnhancing Cyber Wargames: The Crucial Role of Informed Games Design
by Amy Ertan and Peadar Callaghan “Risk – Onyx Edition (Ghosts of board games past)” by derekGavey. Licensed under Creative Commons ‘A game capable of simulating every aspect of war would become...
View Article