Defensive Cyber Warfare

× Clear Filters
6 Articles
A laptop displays a message after being infected by a ransomware as part of a worldwide cyberattack on June 27, 2017 in Geldrop.

Empowering Security Researchers Will Improve Global Cybersecurity

China's response to a software vulnerability last year sparked concerns for "white hat hackers." A deep dive into the tangled regulatory world of security researchers and how improved…
Artificial intelligence security cameras using facial recognition technology are displayed at a stand during the 14th China International Exhibition on Public Safety and Security at the China International Exhibition Center in Beijing on October 24, 2018. A few people sit at a small table in the booth chatting while others look at the displays on the walls.

One Thousand and One Talents: The Race for A.I. Dominance

Introduction The March 2016 defeat of “Go” world champion Lee Sedol by DeepMind, Alphabet’s artificially intelligent AlphaGo algorithm, will be remembered as a crucial turning…
Aerial view of people in white and red to form the Canadian flag.

A Deep Dive into Canada’s Overhaul of Its Foreign Intelligence and Cybersecurity Laws

Following the release of documents by Edward Snowden, many of the Western governments whose agencies’ activities were implicated in the leaks raced to update and modernize their…
Text reading, “Scan Result: Virus W32.Sircam.Worm@mm found. File Not cleaned. This file contains a computer worm, a program that spreads very quickly over the Intent to many computers and can delete files, steal sensitive information, or render your machine unusable. This attachment has a virus that may infect your computer. It cannot be cleaned. We recommend that you Do Not download this attachment.”

Planning for ‘Cyber Fallout’ After the Iranian Nuclear Deal

Keep your cyber tools close, your history books closer. For some, the signing of the July 2015 Iran nuclear deal might appear as a “watershed moment” for abating the…

Hacking Back in Black: Legal and Policy Concerns with the Updated Active Cyber Defense Certainty Act

For years now, there has been a discussion surrounding the feasibility of active cyber defense, and allowing private entities or individuals to “hack back” against hostile…
A North Korean national flag on a tall metal structure waving high above all other buildings in Gijungdong as seen from an observation post on September 28, 2017 in Panmunjom, South Korea.

Cyber, Sovereignty, and North Korea–And the Risk of Inaction

Americans, and people throughout the world, are becoming increasingly aware that there are significant vulnerabilities in the Internet, and that there are malicious actors who…
1-6 of 6 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: