Tag
cybersecurity

Cyber Attacks: Why Retaliating Against China Is the Wrong Reaction
By Jeffrey Carr
Bolstering security measures to foil the next attack, not retaliation, should be the U.S. government's priority.

Cybersecurity: We Need a Chinese Snowden
By Alexander Bowe
Without Chinese revelations about Chinese hacking and espionage, a cyber-détente is unlikely.

Debating China Policy: High Stakes, Hard Choices
By Mercy A. Kuo and Angelica O. Tang
Insights from Patrick Chovanec

Hillary Clinton Is Angry With China Over Cyber Attacks
By Franz-Stefan Gady
Will cyber attacks purportedly carried out by Chinese hackers be a campaign issue in 2016?

China's Military Dream
By Greg Austin
The newest element in military strategy in China's most recent defense white paper is the emphasis on cyber power.

Japan and the United States to Deepen Cybersecurity Cooperation
By Franz-Stefan Gady
The growing threat of digital attacks moves Washington and Tokyo closer together in trying to secure cyberspace.

Are We Exaggerating China’s Cyber Threat?
By Jack Detsch
A new Harvard report suggests that China may not be much of a threat to U.S. cybersecurity. Is that really the case?

Have China and Russia Agreed Not to Attack Each Other in Cyberspace?
By Franz-Stefan Gady
Probably not, as one expert recently told The Diplomat.

How China Plans to Become a World Class Cyber Power
By Greg Austin
China is committed to the exploitation of advanced information and communications technologies in all walks of life.

How China's Ministry of Public Security Controls Cyber Policy
By Greg Austin
How the Ministry of Public Security drives Beijing's cyber policy.

Australia: National Security Innovation Priorities
By Greg Austin
How much should Canberra invest in cyber security, including S&T innovation?

How China Uses its Cyber Power for Internal Security
By Greg Austin
This is the first in a series of 5 articles discussing IT as a means to solidify Communist Party rule in the country.