Featured Articles
By Dr. Michael Senft
March 21, 2024
The relative advantage between attackers and defenders in cyberspace has been the subject of vigorous debate. I argue that the debate should be resolved in favor of cyber attackers, who possess freedom of maneuver to invalidate security assumptions required by modern digital systems. Using the recent “LogoFail” exploit and the 2020 SolarWinds hack, the attacker’s ability to invalidate security assumptions is explored. The limitations of current U.S. cyber strategy are then examined through the lens of attacker advantage in cyberspace. While restraint in the conduct of offensive cyberspace operations is noble, attacker advantage in cyberspace presents challenges in preparing for future conflict.
(Image: DALL-E)By Paul F. Renda
January 19, 2024
Personal computer BIOS/UEFI settings are essential to security of the system from advanced adversary attack vectors.
(Image: Paul F. Renda)By Christine Billingsley
December 4, 2023
By appointment of the National Board of Directors (BoD) of the Military Cyber Professionals Association (MCPA), Christopher P. Cleary is hereby announced as inaugural National President of the MCPA
(Image: MCPA)By Brian Morgan
November 7, 2023
The Minnesota chapter of the MCPA meets for the first time and attends the Annual Cyber Security Summit
(Image: Minnesota MCPA)By Derek Bernsen
October 2, 2023
What lessons can the DOD learn from cyber conflict in the Russia-Ukraine war? While the conflict continues, we can still extract four lessons that the US should incorporate into its planning for conflict. First, cyber will continue to grow in importance and operational impact in warfare. Second, Cyber has a large skill and resource barrier and therefore must be built up and resourced in advance of conflict. Third, the private sector, non-state actors, and vigilantes will play a more direct role in wartime activities than in the past. Fourth, we must assist allies in developing capacity for cyber operations.
(Image: DVIDS)By Amanda Draeger
April 26, 2023
The world is becoming increasingly automated, with computers embedded in devices we use every day. What can we learn from the aviation industry about what to automate, and how to handle the failure of those automations?
(Image: TV Brasil)By Douglas M. DePeppe, JD, LLM
April 25, 2023
Leveraging cyber law in the Web3 age can provide defenders with strategic advantage.
By Lindsay Kaye
April 18, 2023
Threat intelligence data can allow more effective resource usage through data-driven threat hunting.
(Image: Recorded Future)By Joe Billingsley
March 6, 2023
The 2023 National Cybersecurity Strategy lays the groundwork to increase cyber liability and cyber lawyers.
(Image: White House)By Josh Baughman
January 17, 2023
The PLA Rocket Force is shifting to use Virtual Reality (VR) simulation in order to better prepare for war and increase their combat capability. A review of reports show how the Rocket Force is using VR to create a better prepared and more combat ready Rocket Force.
(Image: PLA Daily)By Brad E. Rhodes, Colonel, US Army Reserve
December 1, 2022
With the ubiquitous spread of internet connectivity, the influence of what our Reservists and National Guard members do through their Defense Support of Civil Authorities (DSCA) responsibilities and their support to homeland emergency response can and will influence perception of the American people. What can planners and commanders do to seize the initiative through information operations during these actions?
(Image: Security Boulevard)