Managing the Cyber-Nuclear Nexus

July 24, 2019

Concern about cyber increasingly impacts all aspects of nuclear security, nuclear operations and nuclear thinking. The wide range of dynamics that fall under the cyber moniker are both changing and transforming the nature, capabilities and vulnerabilities of nuclear weapons, as well as the broader context within which security policy and warfare are conducted. This in turn has meant that states are wrestling with new issues of deterrence, arms control and stability as well as the safety, security and management of nuclear weapons and the future shape of the global nuclear order.

Spotlight

Appknox

Appknox is an enterprise-grade mobile security solution that primarily uses security audit scanner to detect vulnerabilities in your mobile app and help you with possible remediations. Our security experts are working continuously to outthink and outsmart unethical hackers that exploit different cyber channels to provide a safe operating environment for businesses. We have worked with companies around the globe in various spaces like banking, e-commerce, mobile wallets, healthcare, BYOD, and 3rd party apps in an effort to build a safe and secure mobile ecosystem.

OTHER WHITEPAPERS
news image

Cyber security considerations 2022

whitePaper | September 12, 2022

The threat landscape is expanding. Cybercriminals are as entrepreneurial as ever and using increasingly sophisticated tools and technologies. In this fluid environment, we believe Chief Information Security Officers (CISOs) and their teams should adopt a mindset of enablement — cyber security is no longer just about prevention.

Read More
news image

Supercharge Your DLP Security Program

whitePaper | December 22, 2022

Today’s digitally transformed organizations handle vast volumes of data that is at perpetual risk for loss and leakage, either intentionally through data breaches or unintentionally through employee errors. With cybercrime damages expected to reach $10.5 trillion annually by 2025, 1 organizations must protect their threat surface holistically.

Read More
news image

Fujitsu PRIMERGY Server Security Overview

whitePaper | May 22, 2023

During the last few years server security has become a key building block for end-to-end security. We see strongly increasing cyber-attacks on server infrastructure, which results in an intense need for server security. This whitepaper presents an overview of the security features which are available for PRIMERGY server.

Read More
news image

DeltaV™ Mobile Security Manual

whitePaper | October 26, 2022

DeltaV™ Mobile provides read-only access to process data and alarms on mobile devices. The solution includes a combination of software and hardware integrated with your existing network

Read More
news image

Cybersecurity Whitepaper 2018

whitePaper | December 12, 2019

Most of the Small to medium-sized companies are unaware about the ways in which they’re vulnerable. More than 45% mistakenly believe they’re not a viable victim. They are just too small a target in comparison to larger organizations and tend to have a blind eye towards the cyber threats they face, which is in sharp contrast to what attackers think.

Read More
news image

Warring State - China's cybersecurity strategy

whitePaper | December 1, 2019

Cyberspace and information technology have enabled the economic, political, and cultural inte - gration of the United States and China. However, interdependence creates costs as well as benefits. Increased interconnection has also contributed to major obstacles in the bilateral relationship, generating mutual distrust of incentives, actions, and norms in cyberspace. Information technology raises new challenges for states by allowing actors to exploit networks, conduct cyber espionage, or compromise national security with greater ease.

Read More

Spotlight

Appknox

Appknox is an enterprise-grade mobile security solution that primarily uses security audit scanner to detect vulnerabilities in your mobile app and help you with possible remediations. Our security experts are working continuously to outthink and outsmart unethical hackers that exploit different cyber channels to provide a safe operating environment for businesses. We have worked with companies around the globe in various spaces like banking, e-commerce, mobile wallets, healthcare, BYOD, and 3rd party apps in an effort to build a safe and secure mobile ecosystem.

Events