cyberattacks

French gendarmes secure the area around the Notre-Dame de l'Assomption Basilica in Nice on Oct. 31, two days after a knife attacker killed three people.

Forget U.N. Peacekeepers: Send in the Gendarmes

In gray-zone conflicts, police don’t have the skills to bring peace and full-scale military interventions can lead to escalation. A force that can bring stability is needed.

election-interference-russia-china-illustration-new3

The United States Isn’t Doomed to Lose the Information Wars

China and Russia are ramping up their disinformation campaigns in the lead-up to the November vote. It’s time for Washington to fight back.

An election worker feeds ballots into a voting machine during an accuracy test at the Miami-Dade Election Department headquarters on Oct. 14 in Doral, Florida.

The United States Needs a Red Team to Protect the Election

Adversaries are trying to undermine U.S. democracy. Hackers and regular citizens must identify weaknesses and make the system resilient in the face of cyberthreats.

A member of the hacking group Red Hacker Alliance monitors global cyberattacks on his computer at an office in Dongguan, China, on Aug. 4.

Lockdowns Have Been Hard on Organized Crime, Too

And a rise in cyber-ransoms is the result. To stop the cycle, businesses should stop paying up.

Workers move iron girders from a crane at the Grand Ethiopian Renaissance Dam, near Guba in Ethiopia, on Dec. 26, 2019.

The Ethiopian-Egyptian Water War Has Begun

The conflict between Ethiopia and Egypt over the Grand Ethiopian Renaissance Dam has already started. It’s just happening in cyberspace.

A medical staffer works on a computer at a hospital in Bergamo, Italy

Note to Nations: Stop Hacking Hospitals

Why now is the time for global cyber-norms to protect health infrastructure.

U.S. President Donald Trump talks to reporters about the whistleblower in the White House Oval Office.

Trump’s Whistleblower Attack ‘Undermines’ U.S. Global Accountability Push

The United States faces charges of double standards in its campaign to promote whistleblower protections at the U.N. and international organizations.

An employee walks behind a glass wall with machine coding symbols at the headquarters of the internet security giant Kaspersky in Moscow on Oct. 17, 2016.

Russia and China Are Trying to Set the U.N.’s Rules on Cybercrime

At the United Nations General Assembly, the United States must push back against their agenda.

glitch, binary code background

8 Ways to Stay Ahead of Influence Operations

With election meddling inevitable in 2020, the United States needs a powerful kill chain.

This photograph, posed as an illustration on May 12, 2017, shows the website of the NHS: East and North Hertfordshire notifying users of the aftermath of a cyberattack on its network taken in London.

Cyberdeterrence Needs People, Not Weapons

Mass mobilization might be the best line of defense in a world of online warfare.

A member of staff poses for a photograph at a workspace in the National Cyber Security Centre on Feb. 14, 2017 in London, England. (Carl Court/Getty Images)

How to Regulate the Internet Without Becoming a Dictator

The British model of filtering data rather than content can protect citizens while preserving an open internet.

A man looks at the computer screen with the page of Russian Prime Minister Dmitry Medvedev on Twitter in Moscow on August 14, 2014. (Yuri Kadobnov/AFP/Getty Images)

Hackers Turn the Tables on Russia

A new website features documents pilfered from Kremlin officials and agencies.

Print

The Rise of the Cyber-Mercenaries

What happens when private firms have cyberweapons as powerful as those owned by governments?

Supreme Commander of the Allied Forces and future U.S. president, General Dwight D. Eisenhower (L) with British Field Marshal Bernard Montgomery (R), his deputy commander, in an unknown location in June 1944 after Allied forces stormed the Normandy beaches.

Washington Needs a New Solarium Project To Counter Cyberthreats

President Eisenhower confronted the unprecedented nuclear threat of the 1950s with a novel exercise. The United States needs a similar approach to tackle today's cyber threats.

North Korean leader Kim Jong Un celebrates the successful test-firing of an intercontinental ballistic missile on July 4, 2017. (AFP PHOTO/KCNA VIA KNS/Getty Images)

North Korean Destructive Malware Is Back, Says DHS Report

Malware not seen since the 2014 attack on Sony has returned, raising the possibility of future destructive attacks.

Alleged Russian soldiers stand outside a Ukrainian military base in Simferopol on March 12, 2014. (Dan Kitwood/Getty Images)

Inside a European Center to Combat Russia’s Hybrid Warfare

Western countries are looking for new ways to defend against a new generation of war. Does a center in Finland have the answers?

Saudi Crown Prince Salman bin Abdulaziz meets Chinese President Xi Jinping after a welcoming ceremony at the Great Hall of the People on March 13, 2014 in Beijing, China. (Lintao Zhang/Getty Images)

What Would a Saudi-Iran War Look Like? Don’t look now, but it is already here

After eight years at Foreign Policy, here are the ten most popular Best Defense posts

Load 10 More Articles