Binding Edge
Debunking NotPetya’s cyber catastrophe myth
Tom Johansmeyer has worked in the insurance industry for more than 20 years. He examines the economic impact of the NotPetya virus
Binding Edge
Europe’s cyber rapid response teams should pivot to proactive missions
Taylor Grossman finds that NATO and EU cyber rapid response teams are not built to respond rapidly to emergencies
Binding Edge
Masculinity can influence cyber strategy
James Shires and Kate Millar examine how different kinds of masculinity shape the evolution and implementation of modern cyber defence strategies in the United States and beyond
Russian space weakness may encourage satellite attacks
Moscow’s satellite capabilities are failing, so it may try to neutralise Western space assets
 single img
Can lawyers lose wars by stifling cyber capabilities?
An Anonymous European Intelligence Official 23 July 2024
Intelligence experts argue that stringent legal frameworks weaken the effectiveness of Western cyber defence capabilities
Read more arrow
 single img
Microsoft’s recent cloud security breach draws attention to new national security risks
Kamil Bojarski / Max van der Horst 19 July 2024
The recent Cyber Safety Review Board report on Microsoft’s 2023 cloud security intrusion underscores broader security failures within CSPs
Read more arrow
 single img
The EU’s Human Rights Sanction Regime could target malicious spyware vendors
Mailyn Fidler 12 July 2024
The European Union has a powerful and underutilised tool at its disposal to counteract human rights abuses linked to commercial spyware
Read more arrow
 single img
Insurers will help define the threshold for cyberwar
Josephine Wolff 4 July 2024
The UK government opted out of a cyber reinsurance backstop, leaving critical decisions about who will pay for major cyberattacks to private insurers
Read more arrow
 single img
Masculinity can influence cyber strategy
James Shires / Katharine Millar 28 June 2024
James Shires and Kate Millar examine how different kinds of masculinity shape the evolution and implementation of modern cyber defence strategies in the United States and beyond
Read more arrow
 single img
The mechanisms of cyber-enabled information campaigning
Jelena Vićić / Richard Harknett 21 June 2024
Effective information campaigns in cyberspace require three key steps: identifying divisive issues and communities that can be polarised; imitating and spreading that content within these specific groups; and amplifying these messages across social media platforms
Read more arrow
 single img
Re-thinking cybersecurity capacity building
James Barr / Sofia Liemann Escobar / Jessica McClearn / Phil Sheriff 18 June 2024
What is it to be secure? The DSLA group examines top down and bottom up approaches to cyber capacity building
Read more arrow
 single img
Russian space weakness may encourage satellite attacks
Elena Grossfeld 13 June 2024
Moscow’s satellite capabilities are failing, so it may try to neutralise Western space assets
Read more arrow
 single img
Learning to supply cyber capabilities
Joseph Jarnecki 10 June 2024
As international cyber capability support mechanisms grow, they must also mature
Read more arrow
 single img
Cyber threats to European elections: beyond the headlines
Jamie Collier 28 May 2024
Sensationalism will have voters believe that the main election threats are vote tampering and deepfakes, but comprehensive threat analysis shows that political parties, campaigns and voters themselves are more likely targets
Read more arrow
The EU’s Human Rights Sanction Regime could target malicious spyware vendors
Mailyn Fidler 12 July 2024
The European Union has a powerful and underutilised tool at its disposal to counteract human rights abuses linked to commercial spyware
Read more arrow
European influence in cyber conflict studies is growing
Myriam Dunn Cavelty / Tobias Pulver / Max Smeets 13 May 2024
The number of cyber conflict articles from European scholars has been rising, shaping the field and policymaking
Read more arrow
It takes a network to catch a network
Meghan Conroy 18 January 2024
'Sedition Hunters' details how open-source intelligence has helped track down those who attacked the US Capitol on January 6
Read more arrow

Terms & Conditions

Lorem ipsum odor amet, consectetuer adipiscing elit. Integer vestibulum massa; habitasse molestie velit tincidunt commodo. Blandit class sollicitudin in natoque fusce tincidunt maecenas tempor potenti. Turpis velit elit pulvinar aliquet sociosqu pharetra eleifend montes? Arcu sed ultricies gravida, tincidunt cubilia lobortis elementum elit. Lectus aptent suscipit auctor ultricies facilisi ultrices. Etiam pellentesque elementum lacinia morbi ac nulla fermentum primis. Eleifend scelerisque phasellus finibus nulla nisl. Dapibus nec accumsan scelerisque fringilla, tempus duis odio.

Duis odio urna mattis sociosqu ornare ligula torquent. Ornare tempus velit euismod nisi eu duis. Interdum torquent libero finibus porta sem ornare sit mauris. Facilisi consequat semper enim torquent nisl penatibus metus quis etiam. Habitant pharetra bibendum rutrum inceptos fermentum volutpat. Vulputate montes dis adipiscing himenaeos nascetur. Erat amet mus ipsum ultricies non aenean. Arcu penatibus primis platea primis tempus non dignissim convallis.

Arcu diam ante est varius pellentesque litora a vivamus? In dis purus tellus commodo semper egestas mattis adipiscing. Mi dis sapien, nisl morbi viverra dictum. Sociosqu lacinia consequat per vivamus elit. Torquent facilisi velit porttitor nunc phasellus facilisis tempor bibendum class. Integer nascetur neque ligula eget consequat lobortis neque ligula. Quisque maecenas a diam viverra senectus feugiat. Consectetur dignissim ut vivamus magna lorem malesuada turpis vitae.

Orci fusce efficitur libero porta porta ante euismod. Diam viverra malesuada integer, dictumst finibus ultricies! Dis turpis sociosqu montes cras arcu. Donec nulla et suspendisse elit accumsan duis tempus. Amet pellentesque lobortis dapibus fusce elementum nisi. Quam ultrices primis pellentesque ante dictumst? Dis rhoncus eros ipsum egestas, senectus potenti. Iaculis pellentesque habitasse vitae sociosqu vivamus lorem ex turpis tortor.

Elit ridiculus ut mollis neque dis. Vel class arcu duis varius fusce metus. Phasellus finibus pellentesque laoreet fusce lacus primis molestie. Ut cras risus arcu tincidunt ante, molestie maximus taciti. Etiam aliquam molestie; justo cubilia integer aenean. Curabitur curabitur suspendisse aliquet eu senectus. Tempus per eget dictum; id tristique velit vulputate pharetra iaculis. Cubilia nisi congue ligula iaculis luctus.