The purpose of the research is to examine this preconceived notion through four overarching research questions: 1. Do combat veterans make better cybersecurity professionals? 2. How much does their experience with risk and threat assessment come into play? 3. Do veterans make better cybersecurity professionals for other reasons? 4. Or is the notion that vets make better cybersecurity professions flawed because the required skills are so technical in nature? As a precursor to a comprehensive study, a large-scale survey was conducted to see what differences, if any, there are between individuals with combat experience and those that do not have such experience.
In the digital age, the vision of autonomous vehicles (AVs) is vibrant. Research is being conducted worldwide to integrate AVs into our everyday lives in the future, spending considerable amounts of money in the development process. Actors from both engineering as well as social sciences are involved in this research, with technical disciplines strongly dominating. In addition to perceived progress of numerous newly developed technologies such as AVs, challenges should also be referred to
Smart home, which controls the end use of the power grid, has become a critical component in the smart grid infrastructure. In a smart home system, the advanced metering infrastructure (AMI) is used to connect smart meters with the power system and the communication system of a smart grid. The electricity pricing information is transmitted from the utility to the local community, and then broadcast through wired or wireless networks to each smart meter within AMI. In this work, the vulnerability of the above process is assessed. Two closely related pricing cyberattacks which manipulate the guideline electricity prices received at smart meters are considered and they aim at reducing the expense of the cyberattacker and increasing the peak energy usage in the local community. A countermeasure technique which uses support vector regression and impact difference for detecting anomaly pricing is then proposed. These pricing cyberattacks explore the interdependance between the transmitted electricity pricing in the communication system and the energy load in the power system, which are the first such cyber-attacks in the smart home context.
Beginning in 2018, US cyber defense architects began promoting the doctrinal strategy of Persistent Engagement (PE), amending a 2015 cyber policy based on deterrence. The PE doctrine encourages cyber soldiers to be quick, nimble, and aggressive—not waiting for an attack to defend against, and instead, maintaining a posture of constant agitation, infiltration, presence, and persistence. Although unintentional (and highly contentions), this cyber approach mirrors the strategic logic of contemporary, digital, antifascists in their efforts to disrupt and deplatform far-right activists online.
Cybersecurity researchers have contributed to the automated extraction of CTI from textual sources, such as threat reports and online articles describing cyberattack strategies, procedures, and tools. The goal of this article is to aid cybersecurity researchers in understanding the current techniques used for cyberthreat intelligence extraction from text through a survey of relevant studies in the literature.
Focusing on the emergence and consolidation of this terminology, I make three arguments about the role of language in cybersecurity policy. First, I propose a new, politically consequential category of metaphor: foundational metaphors, implied by using particular labels rather than stated outright. These metaphors support specific ways to understand complex issues, provide discursive resources to some arguments over others, and shape policy contestation and outcomes. Second, I present a detailed empirical study of US military strategy and doctrine that traces the emergence and consolidation of terminology built on the “cyberspace domain.” This concept supported implicit metaphorical correspondences between the Internet and physical space, yielding specific analogies and arguments for understanding the Internet and its effects. Third, I focus on the rhetorical effects of this terminology to reveal two important institutional consequences: this language has been essential to expanding the military's role in cybersecurity, and specific interests within the Department of Defense have used this framework to support the creation of US Cyber Command.
This paper argues that, despite joint political declarations, NATO and the EU do not sufficiently cooperate in the cyber domain. The investigation not only explores the political reasons for this, but also suggests ways in which the two organizations can effectively cooperate while maintaining their respective political positions. The recommended strategy is to focus on technical cooperation and avoid pursuing ideologies for the benefit of both organizations and their respective Allies and Member States.
This article proposes two policies that parties to a conflict should consider adopting in order to ameliorate such risks. They are both based on the premise that military operations must reflect a balance between military concerns and the interest of States in prevailing in the conflict.
The traditional methods of securing cyber systems via complex passwords frequently fail, exposing the computer systems to many types of cybercrimes. Cybercrime of all kinds is a growing concern for individuals, government and business organizations, and society. Zero Identity is a new technology that "bubbles, cloaks, and hides" computers and their contents from cybercriminals. Zero Identity is a mature and proven military-based technology with over a 20-year history. Cylentium, a cybersecurity startup, is adapting Zero Identity technology to consumers and civilian organizations. Market and technological acceptance of Zero Identity may lead to a cybersecurity paradigm shift in the next decade. This paper explores the history of Zero Identity, what it does, how it works, and its future prognosis. One of the original developers (Rob Langhorne) of the Zero Identity concept was interviewed, as was the concurrent entrepreneur (Wayne Ronhaar). Both Langhorne and Ronhaar became coauthors of this article to contribute their first hand historical perspectives, challenges, and insights to transform technology into a commercial product in a series of articles.
in-depth insights into enterprise AI transaction trends worldwide and the evolving AI threat landscape, based on an analysis of more than 18 billion AI and ML transactions from the world’s largest inline security cloud. Key observations into enterprise AI adoption and blocking trends worldwide. A breakdown of the AI threat landscape with real-world AI attack case studies. AI threat predictions Best practices for securing generative AI and using AI-powered zero trust across the attack chain
Pagination
- First page
- Previous page
- …
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35