Francesca Bosco – UNICRI, Presented at the 2016 Spring SERENE-RISC Workshop. Advances in the field of global technology have transformed the way in which societies function, affecting governments, businesses, and individuals alike, evoking a wide array of societal benefits, while also subjecting populations to varying degrees of cyber risk. Critical infrastructure serves as …
Short answer is bad, but for more reasons than first come to mind. Wikileaks recently released a vault of documents allegedly from the CIA relating to their cyber capabilities[1]. This is not the first time that Wikileaks has released fairly targeted documents against an agency in the United States[2][3][4][5]. Wikileaks founder Julian Assange has clear …
Vinay Kaura provides some insight into the impact of the Internet on insurgency in the region of Kashmir. This region has famously been in conflict for more than half a century and has crossed over into the digital realm. The problems are deeply complex and the informatization of the region has created additional layers with …
While threats that manifest in cyberspace are a national security imperative, they often manifest at a very local level. Digital connectivity is driving shifts in the policing landscape and new operating models are needed to confront the challenges of crimes enabled by the Internet. As a former Deputy Chief of Police with the Toronto …
RAND obtained a dataset of information about zero-day software exploits through a research connection. It is a rich dataset, as some of these exploits have been found by others and some have not. The dataset spans 14 years (2002–2016) and contains information about more than 200 zero-day exploits and the vulnerabilities that they take advantage …
With support from the William and Flora Hewlett Foundation, the Berkman Center for Internet Society at Harvard University a diverse group of security and policy experts from academia, civil society, and the U.S. intelligence community convened to discuss some of the difficult problems of surveillance and cybersecurity. This occurred at the time of public about …