Strategic Analysis June-July 2018 How to Deter in Cyberspace

June 29, 2018

Cyber-attacks are escalating in frequency, impact, and sophistication. State actors play an increasingly larger role in this escalating dynamic, as they use cyber-attacks both offensively and defensively. For example, North Korea has been linked to WannaCry, and Russia to NotPetya, two major cyber-attacks launched in 2017. Russia has also been linked to a series of cyber attacks targeting US critical national infrastructures, which were disclosed in 2018.

Spotlight

V-Key

Deployed by top banks, mobile payment providers, and governments globally, V-OS is the world’s first virtual secure element. Developed by V-Key using a patented cryptographic virtual machine integrated with tamper protections, V-Key is able to provide a complete mobile application security for any mobile application with V-OS as a strong base. Our solutions allow businesses to roll out cloud-based payments, trusted authentication for mobile banking, and other secured mobile applications for user data protection without the need to use any form of hardware secure elements. After all, software security is the new hardware.

OTHER WHITEPAPERS
news image

Apple Platform Security

whitePaper | May 26, 2022

Apple designs security into the core of its platforms. Building on the experience of creating the world’s most advanced mobile operating system, Apple has created security architectures that address the unique requirements of mobile, watch, desktop, and home.

Read More
news image

Best Practices for Row Level Security with Entitlements Tables

whitePaper | September 16, 2022

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

Systemic Cybersecurity Risk and role of the Global Community: Managing the Unmanageable

whitePaper | November 29, 2022

In February 2022, a cyberattack on commercial satellite services in Ukraine caused electricitygenerating wind farms to shut down across Central Europe. In July 2021, supermarkets in Sweden were forced to close their doors after a cyberattack on an IT services provider based in Florida, USA.

Read More
news image

Scenarios for the Future of Cybercrime - White Paper for Decision Makers

whitePaper | January 28, 2020

Project 2020 is an initiative of the International Cyber Security Protection Alliance (ICSPA). Its aim is to anticipate the future of cybercrime, enabling governments, businesses and citizens to prepare themselves for the challenges and opportunities of the coming decade. It comprises a range of activities, including common threat reporting, scenario exercises, policy guidance and capacity building.

Read More
news image

Protecting Against Sophisticated Bot Attacks

whitePaper | November 18, 2022

Bot-generated attacks have risen in visibility, and defending against these attacks is now a priority for most organizations. Yet challenges persist in accurately identifying bot traffic; protecting a distributed, heterogeneous application environment from these attacks; and minimizing the impact to legitimate users while doing so. To address these issues, intelligent protection against sophisticated bots is a necessity. This should include strong analytics coupled with human expertise, a frictionless user experience, and consistent coverage across different architectures and platforms. F5 Distributed Cloud Bot Defense, built on Google Cloud, supports these requirements and can help prevent fraud and abuse against public-facing web applications.

Read More
news image

Cybersecurity Considerations in Autonomous Ships

whitePaper | October 18, 2022

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is a NATO-accredited knowledge hub offering a unique interdisciplinary approach to the most relevant issues in cyber defence.

Read More

Spotlight

V-Key

Deployed by top banks, mobile payment providers, and governments globally, V-OS is the world’s first virtual secure element. Developed by V-Key using a patented cryptographic virtual machine integrated with tamper protections, V-Key is able to provide a complete mobile application security for any mobile application with V-OS as a strong base. Our solutions allow businesses to roll out cloud-based payments, trusted authentication for mobile banking, and other secured mobile applications for user data protection without the need to use any form of hardware secure elements. After all, software security is the new hardware.

Events