Europe eyeing direct access to cloud services for police data requests

In the wake of a spate of terror attacks across Europe, regional interior ministers have been talking tough on tech. Encryption is one technology that’s been under fire from certain quarters. There also has been...

China’s Cybersecurity Law and Draft Implementation Rules

The law applies to all “network operators” and introduces cybersecurity mechanisms. On November 7, 2016, the Chinese government released a draft version of the Cybersecurity Law (CSL) that will govern China’s cyberspace effective June 1,...

Russian Electronic Warfare in Ukraine: Between Real and Imaginable

The outbreak of war in the Donbas region (April 2014) turned Ukraine into one of the main targets of Russian information warfare, information-psychological operations, as well as cyberattacks and electronic warfare. Within the past...

China’s cybersecurity law updated a week before deadline

China's new cybersecurity law has been updated again, a week before it comes into effect on June 1, introducing new criminal sanctions and a potential requirement to obtain consent before collecting personal information through...

Cyber Disrupt 2017

Defending Cyber Dominance

Understood by few, the U.S. has utilized the last decade not only to identify cyberspace as a domain for military operations, but also to occupy the position as the unchallenged leader in this domain....

China’s Cyber Power

The role of cybersecurity in Chinese foreign policy

State of the Cyber Nation: UK Government Report on Cybersecurity Breaches

On 19 April 2017, the UK Government’s Department for Culture, Media and Sport (DCMS) published a report on cybersecurity breaches and how they affected UK companies in the last year. Headline statistics from the report...

Must Read

Facebook Auto Publish Powered By :

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.