All Cyber-Kinetic Security & Cybersecurity Posts
-
Cyber-Kinetic Security
Cybercrime in China – a Growing Threat for the Chinese Economy
Western publications often picture the People’s Democratic Republic of China (hereafter China) as the world’s chief propagator of cyberattacks. But the picture is much more complex than such broad-brush claims suggest. Few Westerners realize that China and its neighbours in the Greater China region (Taiwan, Macau and Hong Kong) have, over last few years, became the most technologically advanced region in the world – ahead…
Read More » -
Cyber-Kinetic Security
When Hackers Threaten your Life – Cyber-Kinetic Risks
The attacker stepped out from behind a hedge in the upper-class suburban neighborhood, being careful to stay in the shadows. Across the street, the last lights shining through the windows of the house had just flickered out. She tugged the bottom of her black hoodie into place and pulled the hood up over her head, casting her face deeper in shadow. Her target sat in…
Read More » -
Cyber-Kinetic Security
Human Zombification as an Information Security Threat
China and Russia share an information security doctrine, one that is significantly different from Euro-Atlantic doctrines. In the Chino-Russian model of information space a discussion about population zombification does happen and it fits squarely within the domain of information security. No, this is not an Onion article. China and Russia have significantly broader definitions of Information Security than US, UK and other mostly aligned Euro-Atlantic…
Read More » -
Cyber-Kinetic Security
Non-Executive Directors as Cyber Champions
As a non-executive director (NED) who often represents cybersecurity and emerging technology interests on boards, I’ve learned that even without being a deep technical expert, I must challenge management and ensure our company’s security posture is sound. In today’s high-risk digital environment, boards can no longer treat cybersecurity as "someone else’s problem." Directors cannot abdicate or simply delegate oversight of cybersecurity - we must instead…
Read More » -
Cyber-Kinetic Security
The World of Cyber-Physical Systems & Rising Cyber-Kinetic Risks
We live in a world in which the way we observe and control it is radically changing. Increasingly, we interact with physical objects through the filter of what computational systems embedded in them tell us, and we adjust them based on what those systems relate. We do this on our phones, in our cars, in our homes, in our factories and, increasingly, in our cities.…
Read More » -
Leadership
MAS TRM Just Reset the Floor for Financial‑Sector Cybersecurity
I’ve spent the last few years in Singapore helping banks, insurers, and market infrastructure across APAC harden their environments. We’ve all said the same thing in private: we need a clear, enforceable baseline that trades vague “best practice” for concrete expectations and timelines. With the Monetary Authority of Singapore’s (MAS) Technology Risk Management (TRM) package - the Guidelines (principles/best practices) and the legally binding TRM…
Read More » -
Cyber-Kinetic Security
Cyber War – scaremongering or reality?
“Cyber war” is a term that is in recent days used so liberally that people may often wonder if these words are as menacing as they sound or used only as a tool to incite fear as a way to control a society that increasingly depends on technology. How we prepare and respond to cyber attacks depends on whether we believe we are in cyber…
Read More » -
Cyber-Kinetic Security
United We Secure: Why Cybersecurity Needs Information Sharing
The cyber battlefield is heating up. On one side, cyber criminals are pooling their knowledge like a well-oiled team; on the other, many organizations still act like lone wolves. I recall a fellow CISO remarking at a meeting, “I don’t need perfect security - just better security than the other guys. Then attackers will leave me alone.” This popular “outrun the bear” analogy - you…
Read More »