22 Items

Report - Potomac Institute for Policy Studies

Kingdom of Saudi Arabia Cyber Readiness at a Glance

| September 2017

The Kingdom of Saudi Arabia Cyber Readiness at a Glance is the ninth study in a series of country reports assessing national-level preparedness for cyber risks based on the Cyber Readiness Index (CRI) 2.0 methodology. This report provides the most in-depth analysis to date of Saudi Arabia’ current cyber security posture and its efforts to strengthen the country's security and resilience in the wake of significant cyber threats to the nation.

Report Cover

CSIS

Report Chapter - Center for Strategic & International Studies

Deterring Iran After the Nuclear Deal

    Author:
  • Michael Sulmeyer
| March 2017

A Senior Iranian Islamic Revolutionary Guard Corps (IRGC) official described a war in cyberspace as "more dangerous than a physical war." This statement was likely made in 2012, in response to a wave of publicly reported cyber operations against Iran, including Stuxnet, Duqu, and Flame. Since these operations, Iran has expanded the role of cyber capabilities in its broader national security strategy. Cyber Security Project Director Michael Sulmeyer assesses the role of cyber tools in Iran's broader strategy.

Israeli Prime Minister Benjamin Netanyahu gives the opening speech of the 'CyberTech 2014' international conference on January 27, 2014 in Tel-Aviv.

Getty Images

Announcement - Belfer Center for Science and International Affairs, Harvard Kennedy School

Study Group with Dan Meridor on Israel's Defense in the Changing Middle East

October 5, 2015

Join Dan Meridor, former Chairman of the Foreign Affairs and Defense Committee of the Knesset, former Chairman of the committee which wrote the report on the Israel Defense Doctrine, and former Minister of Intelligence and Atomic Energy, for a three-session study group on Israel's Defense in the Changing Middle East in November.

Analysis & Opinions - The Huffington Post

Is Cybersecurity Like Arms Control?

| May 18, 2015

"In little more than a generation, the Internet has become the substrate of the global economy and governance worldwide. Several billion more human users will be added in the next decade, as will tens of billions of devices, ranging from thermostats to industrial control systems (the 'Internet of Things'). All of this burgeoning interdependence implies vulnerabilities that governments and non-governmental actors can exploit. At the same time, we are only beginning to come to terms with the national-security implications of this. Strategic studies of the cyber domain resemble nuclear strategy in the 1950s: analysts are still not clear about the meaning of offense, defense, deterrence, escalation, norms, and arms control."

March 8, 2012: Norwich University student Adam Marenna, of Belair, Md.  Deep in the bowels of a building on the campus of the nation's oldest private military academy, students from across the globe are being taught to fight the war of the future.

AP Photo/Toby Talbot

Journal Article - Quarterly Journal: International Security

The Meaning of the Cyber Revolution: Perils to Theory and Statecraft

| Fall 2013

While decisionmakers warn about the cyber threat constantly, there is little systematic analysis of the issue from an international security studies perspective. Cyberweapons are expanding the range of possible harm between the concepts of war and peace, and give rise to enormous defense complications and dangers to strategic stability. It is detrimental to the intellectual progress and policy relevance of the security studies field to continue to avoid the cyber revolution's central questions.

Analysis & Opinions - The Mark News

By Way of Power

| August 26, 2013

"As for the perceived loss of America's much-vaunted superpower status, we simply need to come to terms with the changing reality of international relations, and accept that the United States will have to work with others to achieve its global aims. The changes of a global information age mean that even the world's only superpower can't go it alone."

Running Out of Time on Iran, and All Out of Options

Wikimedia Commons CC

Newspaper Article - The Times of Israel

Running Out of Time on Iran, and All Out of Options

    Author:
  • David Horovitz
| June 19, 2013

"...[Y]es, I think Stuxnet had a few down sides. One of those down sides was that the actual attack code became publicly available. As far as I can tell the attack code was supposed to die and not get out onto the Internet, but apparently the same way it got into Natanz [Iranian nuclear enrichment facility], it got out...."

Analysis & Opinions - The Australian

The Information Revolution Gets Political

| February 11, 2013

"Beneath the Arab political revolutions lies a deeper and longer process of radical change that is sometimes called the information revolution. We cannot yet fully grasp its implications, but it is fundamentally transforming the nature of power in the twenty-first century, in which all states exist in an environment that even the most powerful authorities cannot control as they did in the past."