How to counter worsening cyber-security threats
The online interdependence has increasingly exposed us to malicious actors with bad intentions. In this article, Timo S. Koster provides...
The online interdependence has increasingly exposed us to malicious actors with bad intentions. In this article, Timo S. Koster provides...
In his contribution to Atlantisch Perspectief Jamie Shea provides an overview on how well NATO has adjusted to a growing...
Malicious actors use cyber tools to gain access to sensitive or secret material and then release it in the public...
Threats don’t always come from outsiders. Think of your long-term trusted employee who has been stealing data for a long...
The Netherlands should focus more on the development of European capabilities and institutions. Ruud van Dijk reflects on this AIV-recommendation.
In recent years, the militarization of space seems to be taking off. If this trend continues, space might become the...
According to Anouk Vos it is up to governments to tell IT companies what we want. A bold stance could...
In the ongoing (political) debate on privacy and security, especially since the 2015 terrorist attacks, the Netherlands took a unique...
Most people don’t understand the legal dimensions of cyber-security. Paul Ducheine provides tools for understanding these dimensions.
Hard- and soft-cyber operations are both a threat and an opportunity of which we must take serious account in times...