Binding Edge
Debunking NotPetya’s cyber catastrophe myth
Tom Johansmeyer has worked in the insurance industry for more than 20 years. He examines the economic impact of the NotPetya virus
Binding Edge
Europe’s cyber rapid response teams should pivot to proactive missions
Taylor Grossman finds that NATO and EU cyber rapid response teams are not built to respond rapidly to emergencies
Binding Edge
Masculinity can influence cyber strategy
James Shires and Kate Millar examine how different kinds of masculinity shape the evolution and implementation of modern cyber defence strategies in the United States and beyond
Russian space weakness may encourage satellite attacks
Moscow’s satellite capabilities are failing, so it may try to neutralise Western space assets
 single img
Can lawyers lose wars by stifling cyber capabilities?
An Anonymous European Intelligence Official 23 July 2024
Intelligence experts argue that stringent legal frameworks weaken the effectiveness of Western cyber defence capabilities
Read more arrow
 single img
Microsoft’s recent cloud security breach draws attention to new national security risks
Kamil Bojarski / Max van der Horst 19 July 2024
The recent Cyber Safety Review Board report on Microsoft’s 2023 cloud security intrusion underscores broader security failures within CSPs
Read more arrow
 single img
The EU’s Human Rights Sanction Regime could target malicious spyware vendors
Mailyn Fidler 12 July 2024
The European Union has a powerful and underutilised tool at its disposal to counteract human rights abuses linked to commercial spyware
Read more arrow
 single img
Insurers will help define the threshold for cyberwar
Josephine Wolff 4 July 2024
The UK government opted out of a cyber reinsurance backstop, leaving critical decisions about who will pay for major cyberattacks to private insurers
Read more arrow
 single img
Masculinity can influence cyber strategy
James Shires / Katharine Millar 28 June 2024
James Shires and Kate Millar examine how different kinds of masculinity shape the evolution and implementation of modern cyber defence strategies in the United States and beyond
Read more arrow
 single img
The mechanisms of cyber-enabled information campaigning
Jelena Vićić / Richard Harknett 21 June 2024
Effective information campaigns in cyberspace require three key steps: identifying divisive issues and communities that can be polarised; imitating and spreading that content within these specific groups; and amplifying these messages across social media platforms
Read more arrow
 single img
Re-thinking cybersecurity capacity building
James Barr / Sofia Liemann Escobar / Jessica McClearn / Phil Sheriff 18 June 2024
What is it to be secure? The DSLA group examines top down and bottom up approaches to cyber capacity building
Read more arrow
 single img
Russian space weakness may encourage satellite attacks
Elena Grossfeld 13 June 2024
Moscow’s satellite capabilities are failing, so it may try to neutralise Western space assets
Read more arrow
 single img
Learning to supply cyber capabilities
Joseph Jarnecki 10 June 2024
As international cyber capability support mechanisms grow, they must also mature
Read more arrow
 single img
Cyber threats to European elections: beyond the headlines
Jamie Collier 28 May 2024
Sensationalism will have voters believe that the main election threats are vote tampering and deepfakes, but comprehensive threat analysis shows that political parties, campaigns and voters themselves are more likely targets
Read more arrow
The EU’s Human Rights Sanction Regime could target malicious spyware vendors
Mailyn Fidler 12 July 2024
The European Union has a powerful and underutilised tool at its disposal to counteract human rights abuses linked to commercial spyware
Read more arrow
European influence in cyber conflict studies is growing
Myriam Dunn Cavelty / Tobias Pulver / Max Smeets 13 May 2024
The number of cyber conflict articles from European scholars has been rising, shaping the field and policymaking
Read more arrow
It takes a network to catch a network
Meghan Conroy 18 January 2024
'Sedition Hunters' details how open-source intelligence has helped track down those who attacked the US Capitol on January 6
Read more arrow