warfare
Using Artillery in Complex Environments
June 23 by Defence IQ PressThe war in Ukraine is the most recent example of near peer conflict and as a result there are many lessons to learn from it. This piece focuses on the artillery aspect of the war.
US Department of Defense Strategy for Operating in Cyberspace
November 03 by Defence IQ DigitalThe Department and the nation have vulnerabilities in cyberspace. Our reliance on cyberspace stands in stark contrast to the inadequacy of our cybersecurity – the security of the technologies...
Can NATO Handle the Emerging Cyber Threat from China and Beyond?
September 08 by Defence IQ DigitalCyber law expert Professor Peter Sommer of the London School of Economics speaks with Defence IQ about how NATO will take on new cyber challenges. We also take this opportunity to fully dissect the Pe...
Estonian Advisors Unveil Lessons Learned from 2007 Botnet Attacks
September 01 by Richard de Silva2007 proved to be a watershed moment, not just for the Estonian Ministry of Defence, but also for governments around the globe who are serious about building their cyber defences. Heli Tiirmaa-Klaar...
Operation Shady RAT
August 04 by Neil WaghornInternet security giant McAfee announced findings yesterday that a single state actor was responsible for gaining access to 72 networks over the last 5 years. Its investigation, dubbed ‘Shady...
Drawing a Line Under the Overrated Cyber Threat
August 04 by Defence IQ DigitalWhere do we begin when we talk about prosecuting those guilty of cyber offenses?
Reducing Systemic Cybersecurity Risk
August 04 by Defence IQ DigitalIt is unlikely that there will ever be a true cyberwar. The reasons are: many critical computer systems are protected against known exploits and malware so that designers of new cyberweapons have to...
Head of US cyberdefense agency resigns in wake of hacker attacks
July 26 by Radio Free Europe Radio LibertyJuly 26, 2011 The head of a U.S. government agency responsible for helping respond to cyberattacks on government networks has resigned following several high-profile attacks on U.S. government...
Cyber Law Grapples With the Advent of the Cyber Warfare Century
July 19 by Defence IQ DigitalWhere do cyber criminals, hacktivists and terrorists fall within the legal framework - in the UK and around the globe? How do governments and federal powers successfully prosecute criminal or terror...
US DoD announces first strategy for operating in cyberspace
July 15 by US Department of DefenseThe Department of Defense released today the DoD Strategy for Operating in Cyberspace (DSOC). It is the first DoD unified strategy for cyberspace and officially encapsulates a new way forward for D...
London 2012 Opens Window of Opportunity for Cyber Criminals
June 28 by Contingency TodayAs the Olympics near, the billions pouring into business and local government will attract criminals and siphoning off money from business accounts will be hard to detect, says Iron Keys' Jeremy Fre...
Successful Cyber Attacks Reveal Chinks in US and UK Security Reviews
June 28 by Chris McIntoshWarfare is constantly evolving along with advances in technology. In the past few years, and especially in recent months, it has become apparent that the cyber world is the next theatre of battle. O...