January 25, 2018
Posted by: dpal
The Cybersecurity Initiative at the Jackson School’s International Policy Institute has published two research briefs on emerging cybersecurity topics, in collaboration with Digital Futures Project at Wilson Center. In “Cybersecurity Workforce Preparedness: The
December 1, 2017
Posted by: thormm
In their article “Russia Is Now Providing North Korea With Internet: What That Could Mean For Cyber Warfare“, Matthew Newton and Donghui Park, both Jackson School graduate students and Jackson
October 11, 2017
Posted by: jlbeyer
On December 23, 2015, the control centers of three Ukrainian electricity distribution companies were remotely accessed. Taking control of the facilities’ SCADA systems, malicious actors opened breakers at some 30
August 11, 2017
Posted by: thormm
What does the Pacific Northwest offer in innovation and collaboration on global cybersecurity policy? Enough for the D.C.-based Woodrow Wilson Center for International Scholars to partner with the Jackson School
July 29, 2017
Posted by: jlbeyer
During spring quarter, one of the Jackson School’s Applied Research Program student teams was given a daunting task – help Microsoft think about Brad Smith’s call for a Digital Geneva Convention. In addition to weighing in on current Microsoft strategy, the students found out that they were working on the exact same research task that Microsoft had asked RAND to tackle. The project was the fifth product of a Jackson School Applied Research collaboration with Microsoft’s Global Security Strategy & Diplomacy Team.
January 25, 2017
Posted by: jlbeyer
In 2013, BRICS business leaders announced plans to construct a $185 million submarine cable connecting Brazil, Russia, India, China, and South Africa. However, more than three years later, the BRICS
November 16, 2016
Posted by: jlbeyer
The electricity sector in India is starting to deploy smart grid technologies with the hope that they will play a central role in strengthening this sector so it can provide
October 3, 2016
Posted by: jlbeyer
Extremist use of information and communications technology (ICT) has proliferated, creating a unique security predicament for the companies who provide ICT products and services internationally. As the role of ICT
September 12, 2016
Posted by: jlbeyer
The e-commerce industry has been rapidly growing in India. The distinct constraints and opportunities of the Indian context has shaped how e-commerce has developed, with online retailers having to address
June 28, 2016
Posted by: jlbeyer
North Korea has focused on an asymmetric military strategy because of its lack of conventional power and resources. However, its traditional asymmetric weapons and strength have been monitored by Western countries, therefore, heavily sanctioned. For North Korea, developing and exerting its cyber capabilities is the best way to avoid sanctions while achieving its strategic goals. Cyber tactics are effective because of the characteristics of cyberspace or cyber warfare–the low cost of entry, anonymity, and plausible deniability.