How will cybersecurity experts remember 2018? In the past year, the Trump administration announced it would take more offensive hacking operations against foreign countries, the Department of Justice announced sweeping indictments against Chinese hackers and the U.S. intelligence community reported that foreign countries continued to interfere in American
Topic: Cyber Operations
Dr. Bharat Doshi retired from the US Army Communications-Electronics Research, Development, and Engineering Center (CERDEC), where he was Senior Research Scientist (ST) for Cyber Security. In that role, he developed strategies and techniques for securing current and new generation networks and information systems against all forms of attacks in the cyber
Cyber warfare, cyberterrorism, and cybercrime are serious existential threats to the national security of the United States. This is driving a demand signal for expert cyber operators that is far outpacing the supply. As a result, there is a pressing need to rapidly establish innovative, effective, efficient and responsive cybersecurity education and
Appropriately named "Tallinn Manual 2.0: International Law Applicable to Cyber Operations," the new book offers a fascinating look at how far the cyber threat landscape has evolved in the less than half decade since the first version’s release in 2013, shifting the focus from conventional state-authorized and operated cyber warfare to the small-bore deniable
What makes a good operator? There are a variety of skills, abilities, and traits (SATs) that are critical in different types of cyber operations. Given the sheer number of SATs, it is difficult to identify which individuals have the greatest potential for cyber operations. Further, it is critical to determine if a specific SAT can be learned or reinforced.
In 2015, we continued to see more major cyber attacks than ever before which in turn put pressure on organizations in every industry to have the right measures in place to protect both themselves and their customers. While most organizations already have some sort of security practices in place, many do not have a complete security strategy for end-to-end
This issue looks at the attempts to apply game theory to various aspects of security situations. Also, the explosive growth in the use of instant messaging has resulted in an increased risk to sensitive and personal information and safety due to the influx of cybercrimes. Cyber forensic techniques are needed to assist cybercrime decision support tools in