The discovery of Stuxnet, a malware that targeted a nuclear facility, was somewhat revolutionary and groundbreaking. It targeted ICS which monitor and run industrial facilities. Before...
Cyber offensive technology (a malware that is employed for military use) gives clear asymmetric advantage which favours weaker states and non-state actors. They may pursue cyber...
To begin with, the notion that a state can be vulnerable to a strategic surprise attack is one of the main discourses in cyber debate. A...
Historically war focused on public contests which involve arms, e.g. Gentili’s concept of war. The main goal of such contests is to inflict damage to soldiers...
Stuxnet was a malware which affected an Iranian nuclear facility (along with couple of other industrial sites across the world). It was found in 2010 but...
If a country is hit with a computer program and there is destruction/death involved, there is usually retaliation, a counter attack and an appropriate response. An...
Two decades have passed after Arquilla and Ronfeldt in 1993 warned the public about an upcoming. They were also the first to introduce a concept of...
There is a lot of talk in regards to cyberattacks nowadays. A regular user worries about its data and tries to secure by all means necessary....
Computer and information development has brought us a new brand virtual world. Social networks where people share their personal details; online banking where they manage their...
Not long time ago cyber threats were not even on agenda in security, let along national security landscape. Now, the situation is different. Now, everyone recognizes...