Cyber-Warfare: Stop Asking About the Revolution 

By Daniel Moore We have been expecting cyberwar for decades. Researchers and commentators alike have awaited a revolution in military affairs delivered by non-violent digital coercion. In their view, cyber-warfare was expected to shake the great balance of power, plunge countries into nation-wide outages, and turn our deepest dependencies against us in the fight between nations.Continue reading “Cyber-Warfare: Stop Asking About the Revolution “

The insurance industry and offensive cyber operations: Slow and steady wins the race?

By Daniel Woods The insurance industry is far from a “usual suspect” when it comes to offensive cyber operations. Insurers are neither belligerents, targets nor suppliers of offensive cyber capabilities. Yet they often find themselves footing the bill for the resulting damages. For example, the NotPetya attack—attributed to the Russian military—was estimated to have causedContinue reading “The insurance industry and offensive cyber operations: Slow and steady wins the race?”

Subversion over Offense: Why the Practice of Cyber Conflict looks nothing like its Theory and what this means for Strategy and Scholarship

Cyber attacks are both exciting and terrifying, but the ongoing obsession with ‘cyber warfare’ clouds analysis and hampers strategy development. Much commentary and analysis of cyber conflict continues to use the language of war, where actors use ‘offensive cyber operations’ to meet adversaries in ‘engagements’ striving for victory on the ‘battlefield’ in the ‘cyber domain’.Continue reading “Subversion over Offense: Why the Practice of Cyber Conflict looks nothing like its Theory and what this means for Strategy and Scholarship”

What If the Best Defense Is a Good Defense (Instead of Offense Rebranded as Active Defense)?

Josephine Wolff In cybersecurity, the difference between offense and defense is at once extremely straightforward and incredibly difficult to pin down. It is straightforward because defending your own networks and data and attacking someone else’s look completely different: the former involves implementing security controls and detection systems within the confines of your own computer systems,Continue reading “What If the Best Defense Is a Good Defense (Instead of Offense Rebranded as Active Defense)?”