Cyberspace

  • The Hacked World Order and Geopolitics of Cyberspace

    Speaker: Adam Segal, Ph.D., Ira A. Lipman Chair in Emerging Technologies Director, Digital and Cyberspace Policy Program Council on Foreign Relations For more than 300 years, nation-states dominated international conflict and shaped world order. They used all the instruments they had to make the rules that best served their interests. Two decades ago, digital technologies started to shake up that long-standing system. In 2012, the US government acknowledged that it had … Read More

  • An American flag at center of a cyber grid

    Trump, Twitter, and the Tide of Cybersecurity: Picks of the Week

    Obama officials: There is hope for cybersecurity under Trump | The Christian Science Monitor At RSA, doubts abound over US action on cybersecurity | CSO Online The Rules of the Brave New Cyberworld | Foreign Policy This year’s RSA Conference—one of the largest cybersecurity conferences in the world—broke attendance records with over 40,000 participants, including cyber professionals, academics, and public servants. Although the conference has historically been focused primarily on security tools and … Read More

  • Pell Center Lecture Explores Central Issues and Characters of Cybersecurity

    NEWPORT, R.I. — Last night, Senior Fellow and Director of the Center for 21st Century Security and Intelligence at the Brookings Institution, Peter W. Singer, discussed his latest book “Cybersecurity and Cyberwar: What Everyone Needs to Know” and took his captivated audience on a fascinating tour of the central issues and characters of cybersecurity. The event was part of the ongoing Pell Center lecture series on Cyber Leadership. “A generation ago, ‘cyberspace’ was … Read More

  • Strategic Advantage: Why American Corporations Should Care About Cybersecurity

    Description: Corporate America is constantly being targeted by cyber-attacks and cyber espionage, and its brand integrity and market advantage are increasingly at stake. Melissa Hathaway will discuss several potential targets within our cyberspace—especially private sector networks—common vulnerabilities that allow cyber-attacks to succeed (i.e. poor network security postures or procedures, lack of understanding of the different/layered techniques that are being used to get to us), and what companies can do to … Read More

  • The Future of Digital Security: Will Your Devices Soon be Obsolete?

    The rapid rise in the availability of ever smaller, inexpensive, and increasingly powerful networked devices has revolutionized how—and how quickly—we create, process, store, and share information.  These developments have transformed our world to such an extent it’s hard to recall what life was like before.  Despite their rapid growth, however, the security challenges that have been created as a result of their expansion—password hacking, phishing emails, Internet fraud, identity theft, … Read More

  • Status Update: I’ve been Hacked!

    Chances are high that, at some point today, either you or someone you know has posted an online message through one of the many social media platforms available. Hundreds of millions of users flocked to social networks this year to do precisely that, and they are doing it in record numbers though smart-phones, tablets, or desktop computers. The problem, however, is that this development has been noticed by one group … Read More