News

According to PLA writings, “information deterrence” (xinxi weishe) conceptually includes deterrence in the cyber realm but goes further, encompassing all aspects of information and information ...
Cyber deterrence is dead. Born in the 1990s, the thinking on cyber deterrence was nurtured by the U.S. Department of Defense in numerous war-gaming exercises.
1. Cyber winter. While all of the attention was focused this week on the strange security-related incident in Har Dov, there are increasing reports that may indicate that the cyber war between ...
Members of Congress are increasingly calling for a cyber deterrence strategy that one former DOD official says is possible, but won't be easy. Ever since Russia’s efforts to meddle in the 2016 ...
This does not mean cyber deterrence is doomed to failure. The sheer scale of cyberattacks demands that we do better to defend against them. There are three things we can do to strengthen cyber ...
Enter cyber deterrence. As our societies, government organizations and military forces are becoming more and more cyberspace-reliant, it is natural for the statesmen and analysts to ponder the ...
Politicians and experts routinely call for a strategy that imposes costs on nation states for cyberattacks, but going on offense isn't always the answer. In 2017, Sen. Dan Sullivan (R-Alaska ...
Toward a More Effective Cyber Deterrence Strategy. In any deterrence setting, the optimal response after an attack may not be the same as the threat that optimizes deterrence prior to an attack.
The U.S. approach to cyber deterrence assumes that Washington will be deterring others. The Obama administration's response to Russian interference in the 2016 election tests that assumption.
We also discussed how the DNI’s Cyber Threat Assessment was a driver for the U.S. government to focus on a Cyber Deterrence Framework, to include the following points: There are more cyber bad actors ...
This does not mean cyber deterrence is doomed to failure. The sheer scale of cyberattacks demands that we do better to defend against them. There are three things we can do to strengthen cyber ...