Tackling Cyber Warfare- Introducing Germany’s Fourth Armed Force
In the past two decades, the world has gone from the “Information Age” to the “Digital Age” in an almost seamless transition. However, in the same period, the rise of cyber warfare capability has developed beyond the ability to combat it.
At a time where the lives of civilians and the work of governments and corporations alike are conducted electronically, those who master the tools of cyber destruction could be as much of a menace to society as standing armies.
In this interview, we speak with officials from the Bundeswehr about their initiative to stem the cyber onslaught: the creation of a new branch of their armed forces.
Defence Cyber Protection Partnership - Daniel Selman
Daniel Selman, UK MOD delivered this presentation at 2016's CDANS Conference entitled 'Defence Cyber Protection Partnership working together to protect the Defence sector from the cyber threat'
The Hacking Team Fallout: Who can governments trust now?
In the summer of 2015, Hacking Team, a well-known cyber security firm, was itself the victim of a cyber attack, losing over 400GB of confidential data that included source code, internal documents and sensitive emails.The incident has raised several key questions: How do governments know who to trust when it comes to working with solution providers? Will sensitive data ever be secure enough? And what can be done legally when contractors don't fulfill their promises?
Cyber Security tactics 'divided by a common language'
It is well known that the cyber threats to industrial control systems are increasing in pace and complexity, but the extent to which human operators and technical infrastructures are adapting to these threats is less clear. Ian Buffey, Technical Director, Industrial Control System Cyber Security at Atkins, has worked with control systems for around 25 years, with the last ten of those on security for a products company. This experience has given him a considerable perspective on how people are going about protecting their systems, mostly in the field of critical national infrastructure (CNI).
GCHQ chief ignites debate about government surveillance, tech giants and terrorists
The new head of GCHQ has piled the pressure on large tech firms including Google, Apple and Twitter to facilitate more open communications with government to shore up data privacy and security laws. Robert Hannigan wrote an article in the Financial Times suggesting that web giants including Facebook, WhatsApp and Twitter have become "command-and-control networks... for terrorists and criminals.” This article marks the first public outing for Hannigan since he was appointed GCHQ’s new director in April. He insisted that terrorist groups like ISIL had infiltrated the internet and embraced the use of social media to target and recruit new members. "They [US technology companies and social networks] aspire to be neutral conduits of data and to sit outside or above politics,” Hannigan wrote. "But increasingly their services not only host the material of violent extremism or child exploitation, but are the routes for the facilitation of crime and
NATO hosts largest ever cyber defence exercise
NATO is currently undertaking the largest multination cyber defence exercise that will test the Alliance’s ability to defend its networks against a number of threats. The exercise, Cyber Coalition 2014, is taking place Estonia and involves over 400 technical, government and cyber experts operating from dozens of locations from across the Alliance and partner nations.
Cyber attack from Islamic extremists "very likely," says City of London police chief
The threat of Islamic militants goes beyond car bombs, suicide vests and crude knife and gun attacks; it’s also in the cyber domain...
Dick Crowell US Naval War College - Past Presentation
Dick Crowell, Associate Professor, Information Operations & Cyberspace Operations, U.S. Naval War College delivered this presentation entitled 'What’s Past is Prologue' at 2016's CDANS conference. Download for a copy of the presentation which covered the following points:
Professional military education (PME) as a two way street to aid commanders, industry leaders, and politicians in shaping success in future conflict –conflict that will most certainly include cyber warfare.
- Determining what future combat power is and how to produce, adapt, and operate it under degraded & denied conditions will be critical to winning future wars.
- Moving from a tactical defense to a strategic offensive in conflict will require a multifaceted approach from military services, politicians, industry,and academics.
- We’ve played this game before and we must play it again – and practice
[INFOGRAPHIC] - Is Your Company's Cyber Security Good Enough?
In a recent Oil & Gas IQ survey it showed that most concerns are aimed on Hackivism (61%) and State actors (Espionage 20% & Cyber Warfare 8%). How confident are you that your current defense mechanisms can handle/detect Hackivism?
Download this exclusive and complimentary infographic below and find out what the oil & gas community answered to key cyber security questions!