Content

Report

Oct 4, 2021

Appendices: Cooperation on maritime cybersecurity

By William Loomis, Virpratap Vikram Singh, Dr. Gary C. Kessler, Dr. Xavier Bellekens

The appendices for key players and an acronym list referred to in 'Raising the colors: Signaling for cooperation on maritime cybersecurity.'

Cybersecurity Maritime Security

In-Depth Research & Reports

Oct 4, 2021

Raising the colors: Signaling for cooperation on maritime cybersecurity

By William Loomis, Virpratap Vikram Singh, Dr. Gary C. Kessler, Dr. Xavier Bellekens

Few industries are as critical to the global economy as the maritime transportation system (MTS). However, the efficient operation of the MTS is at risk, as the industry is increasingly vulnerable to cyber threats. The MTS must work to raise its baseline for cybersecurity and better protect its actors from systemic cyber threats going forward.

Cybersecurity Maritime Security

The 5×5

Sep 29, 2021

The 5×5—The future of cyber diplomacy

By Simon Handler

We brought together experts with a range of perspectives to discuss cyber diplomacy and what the future of responsible cyber statecraft looks like.

Civil Society Conflict

GeoTech Cues

Sep 28, 2021

Getting ahead of the next catalyst: A new paradigm for cybersecurity in the space domain

By Andrew LaBarbera and Jeremy Harchelroad

Consider the terms “cyber attacks”and” information and influence activities.” These two terms were relatively infrequently used before the computer malware Stuxnet and the 2016 US presidential election , respectively. Yet these events and the terms characterizing the emergence of new threats mark a threshold where a traditional […]

Cybersecurity

New Atlanticist

Sep 17, 2021

How Russia made Apple and Google complicit in its internet crackdown

By Dylan Myles-Primakoff, Justin Sherman

Just as voting opened in Russia, Apple and Google deleted an app from their stores published by Alexei Navalny's team designed to deliver candidate recommendations. Here's why that signals an international problem.

Cybersecurity Elections

In the News

Sep 13, 2021

Handler and Schroeder on Defense & Aerospace Report’s Cyber Report podcast: Lessons from aircraft hijacking to counter ransomware

By Atlantic Council

On this week’s Cyber Report, sponsored by Northrop Grumman, Simon Handler and Emma Schroeder discuss the new paper “Countering Ransomware: Lessons from Aircraft Hijacking,” with Defense & Aerospace Report Editor Vago Muradian.

Cybersecurity Security & Defense

Report

Sep 13, 2021

Cyber defense across the ocean floor: The geopolitics of submarine cable security

By Justin Sherman

The vast majority of intercontinental global Internet traffic—upwards of 95 percent—travels over undersea cables that run across the ocean floor. The construction of new submarine cables is a key part of the constantly changing physical topology of the Internet worldwide. However, this dependence is not matched by increased security, leaving our undersea cables—the core of the global internet—at risk.

Cybersecurity Europe & Eurasia

Issue Brief

Aug 31, 2021

Trusted connectivity: A framework for a free, open, and connected world

By Kaush Arha

As democracies address the global demand for a free, open, and connected world while ensuring that local and global emissions targets are met, they need an organizing framework: the concept of “trusted connectivity.”

China Cybersecurity

Issue Brief

Aug 26, 2021

Countering ransomware: Lessons from aircraft hijacking

By Simon Handler, Emma Schroeder, Frances Schroeder, and Trey Herr

Ransomware has plagued organizations for more than a decade, but the last three years have experienced a surge in both the number of incidents and the ransoms demanded. To more effectively counter ransomware, the US government should develop a strategy that draws on lessons learned from addressing a surge in aircraft hijackings through the late 1960s and early 1970s.

Cybersecurity Terrorism

The 5×5

Aug 25, 2021

The 5×5—Cyber capacity and conflict in Africa

By Simon Handler

We brought together a panel of contributors with various perspectives on the region to break down the state of cybersecurity in Africa and explore where investments in cyber capacity could go the furthest.

Africa Cybersecurity

Experts