Search: Cybersecurity (104 materials)

 

Two Cyber Resolutions Are Better Than None

... principal multilateral venue for information security talks, which in 2017 found itself at an impasse due to disagreements among its members. Now, though, there will be two groups… A/RES/73/27 and A/RES/73/266 Maria Smekalova: Close Your Eyes and Do It: Cybersecurity in 2018 Today, we can confidently state that the global discussion on international information security has been resumed. In November 2018, the United Nations General Assembly First Committee adopted two draft resolutions at once on the ...

26.02.2019

Russia’s Huawei 5G Conundrum

... Oversight Board is assured that the Ernst & Young Audit Report provides important, external reassurance that the arrangements for HCSEC’s operational independence from Huawei Headquarters is operating robustly and effectively. Ilona Stadnik: A New Cybersecurity Diplomacy: Are States Losing Ground in Norm-making? 5.3 Overall therefore, the Oversight Board has concluded that in the year 2017-2018, HCSEC fulfilled its obligations in respect of the provision of security and engineering assurance artefacts ...

11.02.2019

New U.S. Cybersecurity Strategies

The Evolution of the Doctrinal Foundations of U.S. Cybersecurity Policy The United States was one of the first countries to treat cybersecurity as a matter of strategic importance. The terrorist attacks on September 11, 2001, as well as the growing threat to the economy, which was becoming increasingly ...

19.11.2018

A New Cybersecurity Diplomacy: Are States Losing Ground in Norm-making?

... characteristics of cyberspace that present challenges for its future regulation. There are also legal and political issues. Igor Ivanov: International Security and «Turbid Waters» of Cyberspace Firstly, there are different discourses of understanding cybersecurity: the interpretation of what is actually “secure” in cyberspace/information space is different among “Eastern” and “Western” countries. There is also a considerable variation in the perception of threats emanating from cyberspace....

22.10.2018

Leaders Have to Listen to Different Voices

... machine learning is unrealistic. There will be some biases. Can we understand these biases? I do not know. It would make me happy if they could be identified. However, there is also a good potential: you can get solutions, identify things faster. In cybersecurity field, one of my companies has built a capability of machine learning of behaviors inside computer networks. It can give you a confidence factor, whether your machine is infected or not, that’s a simple example. It will say 95%, which ...

08.10.2018

Russia in the Emerging World Discussed at Stanford University

... sanctions on the country's economy. David Holloway, Professor of International History at Stanford University, talked in depth about the demographic aspects of Russia's development. Russian papers were presented by Maria Smekalova, RIAC Coordinator of Cybersecurity Program. Video

05.10.2018

RIAC at the HSE Roundtable on Cybersecurity

... Economic Forum (WEF), Berkeley’s Center for Long-Term Cyber Security Futures hosted a roundtable "Cyber Security Futures 2025." Berkeley’s Center for Long-Term Cyber Security has developed a set of scenarios that portray a landscape of ‘cybersecurity futures’ designed to stress and stretch trade-offs in objectives and values that will appear in the near future. The scenarios are not exclusively focused on cybersecurity issues themselves, but rather look at the wider impact that game-changing ...

28.09.2018

Europe’s Attempts to Understand Online Extremism

Discussing leading counter-extremism experts at Vox-Pol conference in Amsterdam Extremist and terrorist groups make heavy use of the existing online platforms and services (or create their own) in order to recruit new followers around the world. Easy access to the Internet contributes to the growth of security threats, which are becoming increasingly unpredictable. Why are these online platforms so persuasive to certain audiences? To answer this question, one needs to better understand the nature...

25.09.2018

North Korea's Cyber

How DPRK Created World's Most Effective Cyber Forces In 2016, when a spelling error stopped North Korean hackers from stealing USD 1 billion from the Federal Reserve Bank of New York, Internet users made fun of the programmers. However, experts involved in the investigation of cybercrimes are not laughing: as of today, Pyongyang has one of the most effective and dangerous hacker armies in the world, comparable in number to the cyber forces of the United States. In recent months, the discussions...

03.08.2018

Software Piracy and Cybersecurity in Russia: Dangers, Causes, and Solutions

... on, (ostensibly) protecting these programs from piracy. Maria Gurova: How to Tame the Cyber Beast? However, more than two decades after the Russian Federation joined the Berne Convention, piracy rates remain abnormally high and have become a major cybersecurity challenge for the country. While piracy was originally engaged in by the government as the most expedient way of meeting the national objective of modernization (in the form of public computer use), today it’s private piracy networks ...

24.07.2018
 

Poll conducted

  1. In your opinion, what are the US long-term goals for Russia?
    U.S. wants to establish partnership relations with Russia on condition that it meets the U.S. requirements  
     33 (31%)
    U.S. wants to deter Russia’s military and political activity  
     30 (28%)
    U.S. wants to dissolve Russia  
     24 (22%)
    U.S. wants to establish alliance relations with Russia under the US conditions to rival China  
     21 (19%)
For business
For researchers
For students