Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 351 - 354 of 354 references
2024 - Salvatore Alessandro Sarcià - Springer Fachmedien Wiesbaden GmbH

This paper argues that, despite joint political declarations, NATO and the EU do not sufficiently cooperate in the cyber domain. The investigation not only explores the political reasons for this, but also suggests ways in which the two organizations can effectively cooperate while maintaining their respective political positions. The recommended strategy is to focus on technical cooperation and avoid pursuing ideologies for the benefit of both organizations and their respective Allies and Member States.

Dual-use cybersecurity
2019 - Michael N. Schmitt - Cambridge University Press (CUP)

This article proposes two policies that parties to a conflict should consider adopting in order to ameliorate such risks. They are both based on the premise that military operations must reflect a balance between military concerns and the interest of States in prevailing in the conflict.

Civilian cybersecurity
2021 - Wayne Ronhaar, William Bradley Zehner, Robert Langhorne - Walter de Gruyter GmbH

The traditional methods of securing cyber systems via complex passwords frequently fail, exposing the computer systems to many types of cybercrimes. Cybercrime of all kinds is a growing concern for individuals, government and business organizations, and society. Zero Identity is a new technology that "bubbles, cloaks, and hides" computers and their contents from cybercriminals. Zero Identity is a mature and proven military-based technology with over a 20-year history. Cylentium, a cybersecurity startup, is adapting Zero Identity technology to consumers and civilian organizations. Market and technological acceptance of Zero Identity may lead to a cybersecurity paradigm shift in the next decade. This paper explores the history of Zero Identity, what it does, how it works, and its future prognosis. One of the original developers (Rob Langhorne) of the Zero Identity concept was interviewed, as was the concurrent entrepreneur (Wayne Ronhaar). Both Langhorne and Ronhaar became coauthors of this article to contribute their first hand historical perspectives, challenges, and insights to transform technology into a commercial product in a series of articles.

Civilian cybersecurity
2024 - - zscaler

in-depth insights into enterprise AI transaction trends worldwide and the evolving AI threat landscape, based on an analysis of more than 18 billion AI and ML transactions from the world’s largest inline security cloud. Key observations into enterprise AI adoption and blocking trends worldwide. A breakdown of the AI threat landscape with real-world AI attack case studies. AI threat predictions Best practices for securing generative AI and using AI-powered zero trust across the attack chain

Civilian cybersecurity
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.