Popular articles

Vladimir Orlov: “Russia and the United States should resume a comprehensive dialogue on global nuclear proliferation threats” image

On January 19, 2021, Dr. Vladimir A. Orlov, Director of the PIR Center, gave an interview to Security Index journal.

 

SECURITY INDEX: In your recent op-ed column, co-authored with Sergey Semenov and published by Kommersant Daily, you stated that “Russia and the United States, as major nuclear-weapo...

Heather A. Conley, Vladimir Orlov, Gen. Evgeny Buzhinsky, Cyrus Newlin, Sergey Semenov and Roksana Gabidullina
The Future of U.S.-Russian Arms Control: Principles of Engagement and New Approaches image

As one of its first security policy decisions, the Biden administration agreed to extend the New START Treaty for five years with no conditions.  The New START Treaty represents one of the last remaining vestiges of international arms control architecture and one of the few areas of potentially prod...

Now when the U.S. presidential elections are over the fate of the START Treaty and nuclear arms control, in general, has become clearer.

The New START treaty is set to expire on February 5, 2021, and only a few months ago there was little doubt that it would be the end of it. The Trump administratio...

All articles

Poll




 

How Do You Create a World Financial Community That Is Resilient in the Face of Cyber-Security, Cyber-Espionage, and Hacking?

William Abbott Foster, Hannah Thoreson

Today effective cyber defenses assume higher levels of trust for automated threat sharing, but increased threat sharing also increases one`s vulnerability to new kinds of targeted threats from those with who have learned about your weaknesses. We have moved from a simple world where a threat could be detected by a signature downloaded from an anti-virus firm like Macafee or Symantec and neutralized.

Now attackers will now probe thousands of network simultaneously with thousands of different attacks a second looking for an exploitable vulnerabilities.  These attacks are far  beyond the capability of human operator to identify, isolate, and respond to such attacks or to let those they trust in government and industry to know about the attack in a timely (sub-second) window.

The first step in building an automated defense to current threats, is to make the threat information software and hardware independent. The U.S. government think tank MITRE under contact to the US Department of Homeland Security has developed an XML based system for automatic structured threat information called STIX.


Imprint:

Online Section of PIR Center Program "International Information Security and Global Internet Governance"

Comments

 
 
loading