Operational Implications of the Cyber Security Threat Stack Security teams have to start preparing for attacks that rate as ‘advanced’ now in order to deal with them tomorrow, and they have to start automating incident response. Using a threat stack as a tool allows the time to do just that. Hinne Hettema • January 12, 2015
Two cyber security driven scenarios for the (infra-) structure of future cyberspace The initial neglect of bad intentions while creating cyberspace infrastructure now opens up possibilities of cyber warfare, spionage and terrorism. André Hoogstrate • September 09, 2014
Debating cyber- surveillance The important debate on the balance between privacy and security, in itself not new, does not seem to be progressing in a balanced fashion. Important issues are still not being addressed. Sergei Boeke • June 16, 2014
Keeping an Eye on Big Brother The international dimension of intelligence operations does not only refer to international cooperation between intelligence services, but increasingly to the internationalization of intelligence collection. Jelle van Buuren • May 30, 2014
Watch this Space More countries and corporations vie for a piece of the galactic pie. It will be interesting to see if attempts at developing mechanisms to oversee responsible behaviour in Space can ensure that these small steps for man equate to giant leaps for mankind. Megan Anderson • April 28, 2014
The nature of intelligence in the Digital Age Intelligence gathering and espionage are perhaps as old as civilization itself. Has the Internet, in its virtual and borderless glory, brought a new dimension to these ancient trades? Megan Anderson • March 17, 2014
Cyber war and the crisis in the Ukraine Cyberwar conjures up images of hackers taking out critical infrastructure and paralyzing society. This hyperbole is certainly not applicatie to the situation in the Ukraine. Sergei Boeke • March 16, 2014
Cyber Terrorism Today Since its rise the Internet has been associated with being a perfect instrument for terrorism and politically motivated extremist groups. But authorities use the Internet as well. Which side benefits most from these technological advances? André Hoogstrate • February 26, 2014