Search: Cybersecurity,China (9 materials)

On the Authority of American’s DNI: Are China’s Cyber Espionage and Wolf-Warrior Diplomacy Worrisome for BND and BFV?

... foreign policy objectives, I joined a couple of leading political parties and even endeavored to get along with German intelligence networks thru different channels to obtain a greater picture of foreign policy objectives and forward strategy vis a-vis China. I took part at a number of events launched by politicians and parliamentarians, discussing Germany’s stance towards South Asia, Middle East and East Europe along with South China Sea. At the end of the day, I came across that the narrative of ...

30.12.2020

It’s Hard to Find a Black Cat in a Dark Room, Especially If It Isn’t There. RAND on the Search for Cyber Coercion

... others? These are the questions addressed in the RAND think tank's recent report " Fighting Shadows in the Dark. Understanding and Countering Coercion in Cyberspace ". The authors discuss cyber operations conducted by four states — Russia, China, Iran and North Korea — and try to determine whether those activities amounted to cyber coercion. Starting with the study findings, we will highlight the following points. Cyber operations intended to coerce are a small subset of overall cyber ...

19.11.2019

Strategic Instability in the Era of Information and Communication Technologies: Crisis or the New Norm?

... multipolarity dominated by the United States . This new transformation is, first of all, caused by changes in military and strategic relations between Russia and the United States, as well as by the appearance of a new global centre of power, namely China, which is not involved in the nuclear disarmament process. The gradual erosion of the strategic arms limitation and reduction regime : the United States has now withdrawn both from the ABM Treaty and the INF Treaty, the New START treaty is set ...

07.11.2019

Microsoft Cybersecurity Initiatives

... Anastasia Tolstukhina: Business in Need of Cyber Rules So Microsoft encourages Russian companies to join efforts in the field of cybersecurity? Yes, our business has always been about partnering with others, even going way back to Windows and Office and the ... ... words “every person and every organization on the planet” are important to us because we want to be very clear: Whether it's China, whether it's somewhere in the Middle East, wherever we're not prohibited by law from doing business, we want to find a ...

06.11.2019

India in the Era of Cyber Wars

... handle those matters. Since India does not have enough specialized organizations, foreign organizations were brought in, in particular, American ones, which, for obvious reasons, was not conducive to strengthening cyber protection. Since Pakistan and China were traditionally considered to be India’s principal adversaries on the cyber front, this state of affairs was considered acceptable. The American challenge India’s first serious attempt to respond to challenges in cybersecurity date back to 2012. At the Munich Security Conference, Indian specialists stated they were working on creating their own microprocessors and planning to cut imports of military software, instead of channeling money into domestic R&D (the ...

29.07.2019

Protecting Personal Data: Who Is the Governor?

... project, while partly supporting the idea. Third, suspicious international reactions are detrimental to the country’s image. Pavel Sharikov: Protecting Sensitive Data: The Experience of Russia and the US 3. Juggling various interests Following the Cybersecurity law of 2017, China introduced the non-binding national standard Personal Information Security Specification that is somewhat similar to GDPR. The main focus of the document, however, lies in ensuring national security while still making sure personal data is only ...

11.06.2019

How to Tame the Cyber Beast?

... life are recorded. On the basis of each personal record a given person will be subject to examining before he/she is granted social privileges, i.e. social credit. The punishment scale for any misconduct is severe and rigid. This goes nicely along the cybersecurity law , which was passed in China in 2016 and aims at storing all big data on the Chinese soil. What kind of cyber defense will such a state where the population lives under the big eye have? A question, which will not remain unanswered for long. The backdrop to this story is China’s ...

25.08.2017

Cyberspace: Can Real Players be Brought Together Virtually?

... development of cyberspace. Can Rules of the Game be Worked Out? REUTERS/Christian Hartmann Dmitry Konukhov: Vaccinated Atom: Cybersecurity for Nuclear Plants It is worth noting here that the international regulation of cyberspace has attracted more and ... ... to the securitization and militarization of this sector, as well as to changes in the balance of powers, primarily Russia and China. Cyberspace is not just a phenomenon of international politics, it is the driving force behind a series of transformations ...

10.02.2016

Great Russian-Chinese Cyberwall

Russian diplomacy is in dire need of support from China Cybersecurity challenges are becoming increasingly important for ensuring Russia's national security. The issues of protecting information resources are coming to the fore in Russian foreign and domestic policy. There is reason to believe that the topic ...

31.10.2014

Poll conducted

  1. In your opinion, what are the US long-term goals for Russia?
    U.S. wants to establish partnership relations with Russia on condition that it meets the U.S. requirements  
     33 (31%)
    U.S. wants to deter Russia’s military and political activity  
     30 (28%)
    U.S. wants to dissolve Russia  
     24 (22%)
    U.S. wants to establish alliance relations with Russia under the US conditions to rival China  
     21 (19%)
 
For business
For researchers
For students