... coerce others? These are the questions addressed in the RAND think tank's recent
Fighting Shadows in the Dark. Understanding and Countering Coercion in Cyberspace
". The authors discuss cyber operations conducted by four states — Russia, China, Iran and North Korea — and try to determine whether those activities amounted to cyber coercion.
Starting with the study findings, we will highlight the following points. Cyber operations intended to coerce are a small subset of overall cyber ...
... a new trend in global strategic security as well? It would be hard to argue that this is not a crisis.
Russia — US: On the Brink of a New Nuclear Arms Race
Today there are two approaches — or rather a rift between the old understanding ... ... strategic relations between Russia and the United States, as well as by the appearance of a new global centre of power, namely China, which is not involved in the nuclear disarmament process.
The gradual erosion of the strategic arms limitation and reduction ...
... Cyber Rules
So Microsoft encourages Russian companies to join efforts in the field of cybersecurity?
Yes, our business has always been about partnering with others, even... ... approach our global business. We are always looking for opportunities to engage with Russian companies and bring them the most innovative technologies and solutions, empowering... ... on the planet” are important to us because we want to be very clear: Whether it's China, whether it's somewhere in the Middle East, wherever we're not prohibited by law...
... believed to be of secondary importance are plagued by chronic problems.
Until recently, cybersecurity was not one of the Indian government’s top priorities, and consequently... ... obvious reasons, was not conducive to strengthening cyber protection. Since Pakistan and China were traditionally considered to be India’s principal adversaries on the cyber... ... secret services continue to conduct cyber ops that threaten India’s national security.
Russia is one of the few great powers that has interests in the region and does not...
... country’s economic capability to successfully implement the project, while partly supporting the idea. Third, suspicious international reactions are detrimental to the country’s image.
Protecting Sensitive Data: The Experience of Russia and the US
3. Juggling various interests
Following the Cybersecurity law of 2017, China introduced the non-binding national standard Personal Information Security Specification that is somewhat similar to GDPR. The main focus of the document, however, lies in ensuring national security while still making sure personal data is only ...
... segment of Russian internet, and most recently
all Tor and VPN anonymizers from RUnet (for that matter, same goes for China, who will be
all anonymizers by 2018). Cyber weapons race and cyber defense do not have to be by de fault secret ... ... public either reflects the greater trend of major state cyber policy or derives from it.
RIAC and EWI Policy Brief
Suggestions on Russia-U.S. Cooperation in Cybersecurity
Governments are essentially seeking ways to secure themselves and it applies to all segments of power. Should a ...
... development of cyberspace.
Can Rules of the Game be Worked Out?
Vaccinated Atom: Cybersecurity for Nuclear
It is worth noting here that the international regulation of cyberspace has attracted more and ... ... is linked to the securitization and militarization of this sector, as well as to changes in the balance of powers, primarily Russia and China. Cyberspace is not just a phenomenon of international politics, it is the driving force behind a series of transformations ...
Russian diplomacy is in dire need of support from China
Cybersecurity challenges are becoming increasingly important for ensuring Russia's national security. The issues of protecting information resources are coming to the fore in Russian foreign and domestic policy. There is reason to believe that the topic ...