Category Cyber & Information Warfare

Navigating the SEC’s Amended Cybersecurity Disclosure Rule: A Collaborative Imperative for CFOs and CISOs

Introduction In an era of increasing cyber threats and digital complexity, the U.S. Securities and Exchange Commission (SEC) has stepped up its efforts to ensure that companies maintain robust cybersecurity practices. The SEC’s amended Cybersecurity Disclosure Rule, adopted July 2023…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Fortifying the Defense Industrial Base: A Deep Dive into the DoD’s Cybersecurity Strategy

On March 28, the U.S. Department of Defense (DoD) released its Defense Industrial Base Cybersecurity Strategy, aimed at addressing the evolving cyber threats faced by the defense sector while expanding collaboration between the public and private sectors. The strategy highlights…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Advanced Cyber Operations Prototypes (A-COP): Pioneering Next-Generation Cyber Capabilities

Introduction The digital battlefield is rapidly evolving, and ensuring robust cyber operations is more critical than ever. The Air Force Research Laboratory Information Directorate in Rome, N.Y., has issued an advanced research announcement for the Advanced Cyber Operations Prototypes (A-COP)…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyberspace Operations and Chinese Strategy: Unpacking China’s Approach to Digital Dominance

In recent years, cyberspace has become a new frontier for geopolitical competition. Countries worldwide are adapting to this reality, developing cyber strategies to defend, disrupt, and shape the digital landscape in ways that reflect their national interests. Among the most…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

The Rising Threat of Cyberwarfare: Extreme Cyber Weapons and Their Potential to Disrupt Critical Infrastructure

download 22

In today’s interconnected world, the boundaries of warfare are rapidly expanding from traditional battlefields to digital landscapes, where the stakes are equally high and the threats more insidious. Cyberwarfare, the deployment of cyber attacks to destabilize or disrupt the operations…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

The Global Cyber Weapons Market: Growth and Trends

Introduction In today’s interconnected world, the boundaries of warfare are shifting rapidly from traditional battlefields to digital landscapes. Cyberwarfare—the use of cyber attacks to disrupt the strategic and tactical operations of a nation or organization—is no longer just a theoretical…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

UAS Cybersecurity: Protecting the Skies and Data

As unmanned aircraft systems (UAS) become increasingly prevalent in various sectors, their dual nature as aircraft and information and communication technology systems (ICTS) raises significant cybersecurity concerns. While they excel in providing innovative solutions for industries ranging from agriculture to…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

China’s State-Sponsored Cyber Actors: A Persistent Threat to Global Cybersecurity

Introduction In the dynamic and ever-evolving realm of cybersecurity, the threat posed by China’s state-sponsored cyber actors stands out as both enduring and highly sophisticated. Backed by substantial resources and support from the Chinese government, these actors have developed a…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

The Threat of Privacy Death: Why We Need a Privacy-by-Design Approach

local vs global cropped

In today’s increasingly connected world, privacy has become one of the most valuable commodities—yet it is constantly under threat. With every digital interaction, individuals risk exposing their personal data, often without their full knowledge or consent. From targeted advertising and…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

The Growing Threat of AI Cybercrime and AI Cyber Warfare

Artificial Intelligence (AI) is revolutionizing industries and transforming the way we work, communicate, and live. However, its immense potential is also being exploited by cybercriminals and nation-state adversaries. The combination of AI and cybersecurity poses one of the greatest modern…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here