Search results
1 – 10 of 39
Cybersecurity outlook.
Details
DOI: 10.1108/OXAN-DB241858
ISSN: 2633-304X
Keywords
Geographic
Topical
This follows the ransomware attack on Colonial Pipeline in May. As criminal and state-sponsored cyberattacks intensify, the administration is focusing on threats to US critical…
Details
DOI: 10.1108/OXAN-DB263000
ISSN: 2633-304X
Keywords
Geographic
Topical
Cyber security in South Korea's civil nuclear power sector.
Details
DOI: 10.1108/OXAN-DB195851
ISSN: 2633-304X
Keywords
Geographic
Topical
Biden and other Western officials have not made any specifics public. Nonetheless, the advice underlines the risks to global geopolitical stability from cyberspace, an unstable…
Details
DOI: 10.1108/OXAN-DB268133
ISSN: 2633-304X
Keywords
Geographic
Topical
Both incidents renew the debate over the limits of attribution and the principles which ought to guide appropriate responses by nations and businesses that have been affected by…
Details
DOI: 10.1108/OXAN-DB197269
ISSN: 2633-304X
Keywords
Geographic
Topical
Although companies were initially reluctant to partner with the Cybersecurity and Infrastructure Security Agency (CISA) Joint Cyber Defense Collaborative (JCDC) when it was…
Details
DOI: 10.1108/OXAN-DB271293
ISSN: 2633-304X
Keywords
Geographic
Topical
The incident, which is being widely attributed to Israel, is part of a series of unexplained fires and explosions at sensitive military and industrial sites. It follows heightened…
Details
DOI: 10.1108/OXAN-DB253870
ISSN: 2633-304X
Keywords
Geographic
Topical
The US government was a major target. Microsoft and SolarWinds have attributed the attack to Russia’s foreign intelligence service; Moscow denies any involvement.This is the…
Details
DOI: 10.1108/OXAN-DB259151
ISSN: 2633-304X
Keywords
Geographic
Topical
These have ranged from cyber-espionage campaigns such as the SolarWinds hack to disruptive attacks such as the Sony Pictures breach and the NotPetya and WannaCry malware attacks…
Details
DOI: 10.1108/OXAN-DB273098
ISSN: 2633-304X
Keywords
Geographic
Topical
Both documents observe a more threatening cyber environment that requires a firmer and more comprehensive response.