The Cybersecurity and Geopolitical podcast covers the enmeshing of cybersecurity and geopolitics and the new challenges and intriguing flashpoints these bring to enterprise security and risk professionals. This month, we delve into the threatening and alarming world of misinformation, disinformation, and conspiracy theories.
Yale's Jackson Institute for Global Affairs announced today that it will launch a new International Leadership Center (ILC) and integrate International Security Studies (ISS) in order to further strengthen the Institute’s core research mission.
Geopolitical risks from Myanmar to Central Asia to Sweden are influencing the threat landscape for global enterprises. Companies must carry out systematic and capillary monitoring activities aimed at minimizing risks or, at least, limiting possible impacts.
The city of Eilat, Israel has implemented viisights' behavioral recognition system to detect, predict and analyze events of interests in real-time and alert authorities of crowding, violent/suspicious activity, traffic or crowd congestion, and more.
Independent research conducted by Dr. Mike McGuire, Senior Lecturer in Criminology at the University of Surrey, and sponsored by HP Inc. found a 100% risein ‘significant’ nation state incidents between 2017-2020. Analysis of over 200 cybersecurity incidents associated with nation state activity since 2009 also shows the enterprise is now the most common target (35%), followed by cyberdefense (25%), media and communications (14%), government bodies and regulators (12%), and critical infrastructure (10%).
The University of Kent announced its Institute of Advanced Studies in Cyber Security and Conflict, a University-wide hub promoting interdisciplinary research and educational activities in cybersecurity and conflict. The institute will extend cybersecurity research into wider areas such as international conflict, cyber influence and behavior, cybercrime, cyber law and digital financial technology.
Random simulations took place to test security personnel’s aptitude included prevention, detection and disposal of stowaway attempts, port-users gate clearance procedures, access control procedures and understanding of video surveillance operations.