28/06/2011
Syrian Electronic Army

In this two part report, the "Information Warfare Monitor" document the activities of the Syrian Electronic Army, which appears to be a case of an and organized pro-government computer attack group that is actively targeting political opposition and Western websites.

27/06/2011
The Vulnerabilities of Developed States to Economic Cyber Warfare

Commissioned by Cityforum, this working paper asks whether states and societies should consider economic cyber warfare - aggressive economic action either from, or facilitated by cyber space - as a strategic problem.

21/06/2011
GAO┬┤s Cyber-Command Analysis

The Department of Defense (DOD) d U.S. Cyber Command to counter cyber threats, and tasked the military services with providing support. GAO examined the extent to which DOD and U.S. Cyber Command have identified for the military services the (1) roles and responsibilities, (2) command and control relationships, and (3) mission requirements and capabilities to enable them to organize, train, and equip for cyberspace operations.

20/06/2011
Ten Rules for Cyber Security

In this paper, the Author analyses the ten rules that outline key concepts and areas that must be included or addressed in a comprehensive legal approach to cyber security.

16/06/2011
EU prepares to set up CERT for EU Institutions

The EU institutions have taken an important step to counter the threat of cyber attacks against the EU institutions, bodies and agencies by setting up a Computer Emergency Response pre-configuration Team (CERT). The team is made up of IT security experts from the EU institutions.


1 |  2 |  3 |  4 |  5 |  6 |  7 |  8 |  9 |  10 |  11 |  12 |  13 |  14 |  15 |  16 |  17 |  18 |  19 |  20 |  21 |  22 |  23 |  24 |  25 |  26 |  27 |  28 |  29 |  30 |  31 |  32 |  33 |  34 |  35 |  36 |  37 |  38 |  39 |  40 |  41 |  42 |  43 |  44 |  45 |  46 |  47 |  48 |  49 |  50 |  51 |  52 |  53 |  54 |  55 |  56 |  57 |  58 |  59 |  60 |