... characteristics of cyberspace that present challenges for its future regulation. There are also legal and political issues.
Igor Ivanov:
International Security and «Turbid Waters» of Cyberspace
Firstly, there are different discourses of understanding cybersecurity: the interpretation of what is actually “secure” in cyberspace/information space is different among “Eastern” and “Western” countries. There is also a considerable variation in the perception of threats emanating from cyberspace....
... machine learning is unrealistic. There will be some biases. Can we understand these biases? I do not know. It would make me happy if they could be identified.
However, there is also a good potential: you can get solutions, identify things faster. In cybersecurity field, one of my companies has built a capability of machine learning of behaviors inside computer networks. It can give you a confidence factor, whether your machine is infected or not, that’s a simple example. It will say 95%, which ...
... sanctions on the country's economy. David Holloway, Professor of International History at Stanford University, talked in depth about the demographic aspects of Russia's development. Russian papers were presented by Maria Smekalova, RIAC Coordinator of Cybersecurity Program.
Video
... Economic Forum (WEF), Berkeley’s Center for Long-Term Cyber Security Futures hosted a roundtable "Cyber Security Futures 2025."
Berkeley’s Center for Long-Term Cyber Security has developed a
set of scenarios
that portray a landscape of ‘cybersecurity futures’ designed to stress and stretch trade-offs in objectives and values that will appear in the near future. The scenarios are not exclusively focused on cybersecurity issues themselves, but rather look at the wider impact that game-changing ...
Discussing leading counter-extremism experts at Vox-Pol conference in Amsterdam
Extremist and terrorist groups make heavy use of the existing online platforms and services (or create their own) in order to recruit new followers around the world. Easy access to the Internet contributes to the growth of security threats, which are becoming increasingly unpredictable. Why are these online platforms so persuasive to certain audiences? To answer this question, one needs to better understand the nature...
How DPRK Created World's Most Effective Cyber Forces
In 2016, when a spelling error stopped North Korean hackers from stealing USD 1 billion from the Federal Reserve Bank of New York, Internet users made fun of the programmers. However, experts involved in the investigation of cybercrimes are not laughing: as of today, Pyongyang has one of the most effective and dangerous hacker armies in the world, comparable in number to the cyber forces of the United States.
In recent months, the discussions...
... country’s officials refrain from speaking openly on the subject. However, on the doctrinal level, the wording tends to be either based on strict principle or very careful. The clearest example of this is a lengthy discussion on information security vs. cybersecurity and the differences in approaches.
What’s more, when looking at various public statements on a subject, one should draw a clear distinction between those made by politicians and those made by technical experts and diplomats at international ...
... on, (ostensibly) protecting these programs from piracy.
Maria Gurova:
How to Tame the Cyber Beast?
However, more than two decades after the Russian Federation joined the Berne Convention, piracy rates remain abnormally high and have become a major cybersecurity challenge for the country. While piracy was originally engaged in by the government as the most expedient
way of meeting the national objective
of modernization (in the form of public computer use), today it’s private piracy networks ...
Reaffirming that a nuclear war cannot be won and must never be fought, the United States and Russia could agree to specific steps at Helsinki to reduce nuclear risks
Presidents Trump and Putin will finally meet next week in Helsinki for a bilateral summit. Throughout the Cold War, summits between US and Soviet leaders were overwhelmingly welcomed in both countries and the world as an opportunity to reduce tensions. After the Cold War, these meetings became routine. Today, the scheduling of the...
On June 17–18, 2018, London hosted a regular fourth meeting of a group of former and current high-level officials and experts from the countries of the Euro-Atlantic region (the Euro-Atlantic Security Leadership Group, EASLG), focusing on the issues of common security interests and prospects for cooperation in the region.
On June 17–18, 2018, London hosted a regular fourth meeting of a group of former and current high-level officials and experts from the countries of the Euro-Atlantic region (the...