Quantcast
Channel: Cybersecurity Archives - Strife
Browsing all 24 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Lies, Damn Lies, and Statistics: Understanding the 2013 Verizon DBIR

By David Grebe Every year, Verizon publishes the Data Breach Investigations Report (DBIR). This report, while far from perfect, gives us a glimpse into the state of the field, and allows us to...

View Article


Image may be NSFW.
Clik here to view.

The problem with curtains

By Andreas Haggman: Arend van Dam cartoon, respectfully modified by the Webmaster, Strife   Edward Snowden’s revelations have prompted fierce debates in both the intelligence world and the cyber domain...

View Article


Image may be NSFW.
Clik here to view.

Call for papers: A world in flux? Analysis and prospects for the U.S. in...

A world in flux? Analysis and prospects for the U.S. in global security  Call for papers US Foreign Policy Research Group and Strife first annual conference March 4, 2015 at King’s College London The...

View Article

Image may be NSFW.
Clik here to view.

Surveillance, bulk data collection and intelligence. Interview with Bruce...

Bruce Schneier is an internationally renowned security technologist and the author of 13 books — including “Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World” — as well...

View Article

Image may be NSFW.
Clik here to view.

Review: “Data and Goliath: The Hidden Battles to Collect Your Data and...

By: Christy Quinn: Bruce Schneier, Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World.  New York, NY: W.W. Norton., 2015. Pp. 400. £ 17.99, ISBN: 978-0-393-24481-6. If...

View Article


Image may be NSFW.
Clik here to view.

Cyber risks to governance, Part II – The Attribution Game: the challenges and...

By Yuji Develle and Jackson Webster: In an era of Snowden, Wikileaks, Dark Web and data breaches there have never been so many cyber risks associated with governance. This article is the second of a...

View Article

Image may be NSFW.
Clik here to view.

Cyber risks to governance, Part III: Hyper-connectivity and its impact on...

By: Christy Quinn In an era of Snowden, Wikileaks, Dark Web and data breaches there have never been so many cyber risks associated with governance. This article is the third of a 3-part Strife series...

View Article

Image may be NSFW.
Clik here to view.

Film Review: Zero Days (2016)

Gibney, A. Zero Days, Jigsaw Productions, (2016). (PG-13) More information from: http://gb.imdb.com/title/tt5446858/. By: Cheng Lai Ki “The science fiction cyberwar scenario is here…” This statement...

View Article


Image may be NSFW.
Clik here to view.

Brainjacking: The uncomfortable truth of bio-technology

By: Cheng Lai Ki Modular Prosthetic Limb (MPL) was developed as part of a four-year program by the Johns Hopkins Applied Physics Laboratory, along with Walter Reed National Military Medical Center and...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity in Practice (Introduction): Outside the Mainstream

By: Cheng Lai Ki ‘In theory, theory and practice are the same. In practice, they are not.’ – Anonymous (not the hacktivist group) Over the last century, human experiences have progressively benefited...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity In Practice (Part I): Software Power

By Marcelo A. O. Malagutti[1] Software increases its importance on a daily basis. Could it come to affect the balance of power among nations? ‘Might an army of software wizards use insidious electronic...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity in Practice (Part II): Cybersecurity of Unmanned Autonomous...

By: Arthur Laudrain Thales’ Stratobus – autonomous stratospheric platform between a drone and a satellite The resilience of aerial and space platforms are not the first issue that oomes to mind when...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity in Practice (Part III): PWNED Maritime Systems

By: Cheng Lai Ki Internet based Maritime Traffic Map detailing the positions of types of vessels off the coast of the United Kingdom Russian cybersecurity firm Kaspersky suggested in a May 2015 report...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity in Practice (Part IV): Realities and Importance of effective...

By: Nicolas Castellon Photo of a server room that allows for seamless storage and control of data. We are now witnessing the beginning of the digital age. In the last couple of years, we have witnessed...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity in Practice (Part V): Securing the Digital Frontier

By: Cheng Lai Ki ‘Norse Attack Map’ A threat monitoring program developed by cybersecurity firm Kaspersky showing live cyberattacks in real time around the world. The digital-physical divide is...

View Article


Image may be NSFW.
Clik here to view.

Strife Feature, Abstract: A Beginners Guide to the Musical Scales of Cyberwar

By: Jessica “Zhanna” Malekos Smith Musical scales of cyberwar: the graphic of a piano keyboard illustrates how the core principles of the law of war apply to cyberspace In Strife’s long-form feature...

View Article

Image may be NSFW.
Clik here to view.

Strife Feature – A Beginners Guide to the Musical Scales of Cyberwar

By: Jessica “Zhanna” Malekos Smith Musical scales of cyberwar: the graphic of a piano keyboard illustrates how the core principles of the law of war apply to cyberspace Whether you are a cybersecurity...

View Article


Image may be NSFW.
Clik here to view.

The Rise of ‘Digital Nations’

By Cheng Lai Ki The Internet-of-Things (I0T) refers to the dense nexus of sensors and computers built on the hyper-connectivity of the Internet essential for economic development, national security and...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security in the Age of COVID-19: An Interview with Marcus Willett

by Ed Stacey The World Health Organisation has reported a fivefold increase in cyber attacks during COVID-19 (Image credit: Getty Images) On 22 April 2020, Ed Stacey sat down with Marcus Willett to...

View Article

Image may be NSFW.
Clik here to view.

Enhancing Cyber Wargames: The Crucial Role of Informed Games Design

by Amy Ertan and Peadar Callaghan “Risk – Onyx Edition (Ghosts of board games past)” by derekGavey. Licensed under Creative Commons   ‘A game capable of simulating every aspect of war would become...

View Article
Browsing all 24 articles
Browse latest View live