Search: Cybersecurity (120 materials)

 

A New Cybersecurity Diplomacy: Are States Losing Ground in Norm-making?

... characteristics of cyberspace that present challenges for its future regulation. There are also legal and political issues. Igor Ivanov: International Security and «Turbid Waters» of Cyberspace Firstly, there are different discourses of understanding cybersecurity: the interpretation of what is actually “secure” in cyberspace/information space is different among “Eastern” and “Western” countries. There is also a considerable variation in the perception of threats emanating from cyberspace....

22.10.2018

Leaders Have to Listen to Different Voices

... machine learning is unrealistic. There will be some biases. Can we understand these biases? I do not know. It would make me happy if they could be identified. However, there is also a good potential: you can get solutions, identify things faster. In cybersecurity field, one of my companies has built a capability of machine learning of behaviors inside computer networks. It can give you a confidence factor, whether your machine is infected or not, that’s a simple example. It will say 95%, which ...

08.10.2018

Russia in the Emerging World Discussed at Stanford University

... sanctions on the country's economy. David Holloway, Professor of International History at Stanford University, talked in depth about the demographic aspects of Russia's development. Russian papers were presented by Maria Smekalova, RIAC Coordinator of Cybersecurity Program. Video

05.10.2018

RIAC at the HSE Roundtable on Cybersecurity

... Economic Forum (WEF), Berkeley’s Center for Long-Term Cyber Security Futures hosted a roundtable "Cyber Security Futures 2025." Berkeley’s Center for Long-Term Cyber Security has developed a set of scenarios that portray a landscape of ‘cybersecurity futures’ designed to stress and stretch trade-offs in objectives and values that will appear in the near future. The scenarios are not exclusively focused on cybersecurity issues themselves, but rather look at the wider impact that game-changing ...

28.09.2018

Europe’s Attempts to Understand Online Extremism

Discussing leading counter-extremism experts at Vox-Pol conference in Amsterdam Extremist and terrorist groups make heavy use of the existing online platforms and services (or create their own) in order to recruit new followers around the world. Easy access to the Internet contributes to the growth of security threats, which are becoming increasingly unpredictable. Why are these online platforms so persuasive to certain audiences? To answer this question, one needs to better understand the nature...

25.09.2018

North Korea's Cyber

How DPRK Created World's Most Effective Cyber Forces In 2016, when a spelling error stopped North Korean hackers from stealing USD 1 billion from the Federal Reserve Bank of New York, Internet users made fun of the programmers. However, experts involved in the investigation of cybercrimes are not laughing: as of today, Pyongyang has one of the most effective and dangerous hacker armies in the world, comparable in number to the cyber forces of the United States. In recent months, the discussions...

03.08.2018

Mean Girls and Cybersecurity

... country’s officials refrain from speaking openly on the subject. However, on the doctrinal level, the wording tends to be either based on strict principle or very careful. The clearest example of this is a lengthy discussion on information security vs. cybersecurity and the differences in approaches. What’s more, when looking at various public statements on a subject, one should draw a clear distinction between those made by politicians and those made by technical experts and diplomats at international ...

27.07.2018

Software Piracy and Cybersecurity in Russia: Dangers, Causes, and Solutions

... on, (ostensibly) protecting these programs from piracy. Maria Gurova: How to Tame the Cyber Beast? However, more than two decades after the Russian Federation joined the Berne Convention, piracy rates remain abnormally high and have become a major cybersecurity challenge for the country. While piracy was originally engaged in by the government as the most expedient way of meeting the national objective of modernization (in the form of public computer use), today it’s private piracy networks ...

24.07.2018

How to Reduce Nuclear Risks in Helsinki

Reaffirming that a nuclear war cannot be won and must never be fought, the United States and Russia could agree to specific steps at Helsinki to reduce nuclear risks Presidents Trump and Putin will finally meet next week in Helsinki for a bilateral summit. Throughout the Cold War, summits between US and Soviet leaders were overwhelmingly welcomed in both countries and the world as an opportunity to reduce tensions. After the Cold War, these meetings became routine. Today, the scheduling of the...

12.07.2018

The Fourth Meeting of the Euro-Atlantic Security Leadership Group

On June 17–18, 2018, London hosted a regular fourth meeting of a group of former and current high-level officials and experts from the countries of the Euro-Atlantic region (the Euro-Atlantic Security Leadership Group, EASLG), focusing on the issues of common security interests and prospects for cooperation in the region. On June 17–18, 2018, London hosted a regular fourth meeting of a group of former and current high-level officials and experts from the countries of the Euro-Atlantic region (the...

20.06.2018
 

Poll conducted

  1. In your opinion, what are the US long-term goals for Russia?
    U.S. wants to establish partnership relations with Russia on condition that it meets the U.S. requirements  
     33 (31%)
    U.S. wants to deter Russia’s military and political activity  
     30 (28%)
    U.S. wants to dissolve Russia  
     24 (22%)
    U.S. wants to establish alliance relations with Russia under the US conditions to rival China  
     21 (19%)
For business
For researchers
For students