While government and military leaders have incessantly been asking industry for more automation in cyber network defense tools, some are also warning of the increased threat automation is posing on the offensive side.
CS Digest Section: Cyberwarfare
On the civilian side, the new report warns that for at least the next five-to-10 years, other nations will have offensive cyber capabilities that "far exceed the United States' ability to defend and adequately strengthen the resilience of its critical infrastructures."
NATO and partner countries are sharing R&D in the development of cyber-security tools to achieve economies of scale, including the CIICS (Cyber Information and Incident Coordination System) which has just been deployed in the Alliance's 24/7 cyber operations center.
The Army, which already has 30 cyber teams at full operational capability and 11 more at initial operating capability, is aiming to have 41 fully operational teams by year’s end.
Appropriately named "Tallinn Manual 2.0: International Law Applicable to Cyber Operations," the new book offers a fascinating look at how far the cyber threat landscape has evolved in the less than half decade since the first version’s release in 2013, shifting the focus from conventional state-authorized and operated cyber warfare to the small-bore deniable
Since 2015, the 24th Air Force (24 AF) and Air Force Life Cycle Management Center (AFLCMC) have been working to establish a Cyber Proving Ground (CPG), located at Joint Base San Antonio-Lackland, Texas, in support of the 24 AF’s cyber missions and cyber weapon systems, and associated touch points of the 25 AF missions.
US Office of the Director of National Intelligence releases unclassified version of intel community's findings on Russia's attempts to influence US presidential race via cyberattacks, leaks, and pure propaganda.
Germany's domestic intelligence agency on Thursday reported a striking increase in Russian propaganda and disinformation campaigns aimed at destabilizing German society and targeted cyber attacks against political parties.
For decades, deterrence has effectively countered the threat of nuclear weapons. Can we achieve similar results against cyber weapons?
A U.S. defense contractor was threatened with bankruptcy by Chinese hackers seeking jet fighter logistics secrets, according to the Pentagon’s Joint Staff.