Insights
Keeping you informed with the latest developments and news in the cyber security and intelligence sectors.
Keeping you informed with the latest developments and news in the cyber security and intelligence sectors.
Cost imposition—the idea that you try and make life as difficult as you can for your adversary—is common across cyber security, counterespionage, and increasingly considered in the detection and mitigation of influence operations.
According to the Oxford Institute of Population Ageing (because of course there’s an Oxford Institute of Population Ageing), 70% of voters in the 2019 European Union parliamentary elections were 40 years old or above.
I would need more than ten fingers to count the number of times I’ve personally concluded a digest by explaining that online threats such as disinformation and conspiracy need offline solutions; mainly through policies that better educate the public in digital resilience.
I’m always curious about who starts conspiracy theories. Is it just one random person in their dark room on a computer with a light bulb moment and the power of the internet? How does it catch on? And are we all just engineered to speculate? The latest conspiracy theory to rock our world is around the House of Windsor, and more specifically – Kate Middleton and the conspiracy theories over her health on social media.
Online influence campaigns are becoming increasingly common as political parties and state actors around the world seek to manipulate public opinion.
To most people, online influence operations involve competing ideologies battling it out in the public sphere.
Last week, Russian President Vladimir Putin complained that former Fox News anchor Tucker Carlson had been too soft; saying Carlson avoided “sharp questions” during their interview on 06 February.
Over the past few weeks, thousands of farmers across Europe have taken to the streets to voice their anger over government policies which they claim are destroying agriculture and making the industry nonviable.
Taylor Swift is the latest target of a far-right conspiracy theory that claims her and NFL boyfriend, Travis Kelce, are part of a ‘psyop’ (psychological operation).
Cyber security; when everything is going well, it’s easy for non-tech and non-risk people to underestimate the value of the services they’re paying for and the controls that have been put in place.
Metricising harm often boils down to looking at two things: intent and capability. What is your threat actor trying to do, and how good are they at doing it.
The other day, my friends and I were discussing how truly difficult it is to stay anonymous online. As digital investigators who rely on open-source intelligence to gain information, we’ve come to realise how much of our personal lives are floating around for anyone to come find.