29/02/2012
NATO’s Cyber Capabilities: Yesterday, Today, and Tomorrow

On February 27, the Atlantic Council hosted a panel discussion on NATO’s evolving role in cyber defense and security. The panel discussed key cyber challenges confronting the transatlantic Alliance. The event also served as the launch for a new issue brief "NATO´s Cyber Capabilities: Yesterday, Today, and Tomorrow", authored by Jason Healey, director of the Atlantic Council´s Cyber Statecraft Initiative, and Leendert van Bochoven, NATO and European Defense leader at IBM.

22/02/2012
World Economic Forum´s Global Risks 2012 Report

In its seventh edition, the World Economic Forum´s Global Risks Report features more refined risk descriptions and rigorous data analysis covering 50 global risks. It aims to improve public and private sector efforts to map, monitor, manage and mitigate global risks. It is also a “call to action” for the international community to improve current efforts at coordination and collaboration, as none of the global risks highlighted respects national boundaries.

15/02/2012
Cyber Security Act of 2012 Introduced

The Cybersecurity Act of 2012 is a joint effort by leaders and senior members of the Senate Committees on Commerce, Homeland Security and Governmental Affairs, and Intelligence to give the federal government and the private sector the tools necessary to protect U.S. most critical infrastructure from growing cyber threats.
The bill is a combination of legislation passed by the Commerce and Homeland Security Committees, and it incorporates extensive input from companies and trade associations representing a large swath of the private sector, including the information technology, financial services, telecommunications, chemical, and energy sectors.

01/02/2012
The US national cyber-security threats

The National Intelligence Director James Clapper said in testimony delivered to the House Intelligence Committee on tuesday that, among state actors, China and Russia are of particular concern. In fact, as indicated in the October 2011 biennial economic espionage report from the National Counterintelligence Executive, entities within these countries are responsible for extensive illicit intrusions into US computer networks and theft of US intellectual property.

31/01/2012
Cyber-security. The vexed question of global rules

This report is made up of a survey of some 250 leading authorities worldwide and of interviews carried out in late 2011 and early 2012 with over 80 cyber security experts in government, companies, international organisations and academia.
It offers a global snapshot of current thinking about the cyber-threat and the measures that should be taken to defend against it, and assesses the way ahead.


1 |  2 |  3 |  4 |  5 |  6 |  7 |  8 |  9 |  10 |  11 |  12 |  13 |  14 |  15 |  16 |  17 |  18 |  19 |  20 |  21 |  22 |  23 |  24 |  25 |  26 |  27 |  28 |  29 |  30 |  31 |  32 |  33 |  34 |  35 |  36 |  37 |  38 |  39 |  40 |  41 |  42 |  43 |  44 |  45 |  46 |  47 |  48 |  49 |  50 |  51 |  52 |  53 |  54 |  55 |  56 |  57 |  58 |  59 |  60 |