What does it mean to shift security to the left? In this special report, Bryan Roh explores the origins of the DevSecOps movement and the reasons behind its increasing adoption in the global software industry.
Title: What Energy Security Means For Canada and the WorldFeatured Speakers: Dr. Robert M. Cutler Senior Research Fellow and Director, Energy Security Program NAOC; Allan Fogwill President and CEO Canadian Energy Research Institute; Dr. Monica Gattinger Director Institute for Science, Society and Policy University of Ottawa; Dr. Richard Norris Managing Partner Pandreco Energy Advisors Series: Energy Read More…
In part two of her series on digital white supremacy, Emma Tallon analyzes how governments around the world are confronting the increasing cyber threats.
In part one of a two-part series, Emma Tallon analyses the rise of white supremacy in the digital world, and reflects on its ongoing threats to human security.
In this article, Junior Research Fellow Maryse Kiese analyzes Canada’s contribution to NATO’s cyber defence strategy by shedding the light on its national approach to improve cyber security and deter cyber criminals.
In today’s day and age, the battlefields of war and the boundaries of conflict have changed significantly. Conflict can manifest in various forms – hot wars, cold wars, trade wars, and most recently cyberwar. Digital attacks have the capacity to cripple a states infrastructure from thousands of kilometers away. The internet has become a new Read More…
In the final article of a three part series, we explore what norms govern cyber attacks, retaliatory or otherwise, within the realm of international conflict.
Amaliah Reiskind’s infographic shares information on the Communications Security Establishment’s most recent report assessing what to expect for the 2019 federal election regarding cyber security.
Junior Research Fellow Ramesh Balakrishnan explores ways small states can make up for their limited cyber security investment capabilities while still developing an effective cyber security strategy.
True global security requires that cyberwarfare be governed by international law, but several factors make this difficult, if not impossible. In the second part of a multipart series, Adam Zivo zeroes in on how anonymity and attribution problems challenge our legal systems.