Scroll to the top

{{ subpage.title }}

China & Russia are "formidable" cyber adversaries: CISA's Jen Easterly
China & Russia: "Formidable" Cyber Adversaries | CISA's Jen Easterly on US Defense | GZERO World

China & Russia are "formidable" cyber adversaries: CISA's Jen Easterly

The next 10 years are critical for America to defend itself from China and Russia in cyberspace, says US cybersecurity chief Jen Easterly.

We'll know by then if we've won or lost the battle for tech innovation against Beijing and Moscow when it comes to things like smart cities, she tells Ian Bremmer on GZERO World.

And despite the Russians being a more urgent threat, the long-term race with China to dominate global tech is arguably even more important.

Read moreShow less
How private businesses help fight cybercrime
How Private Businesses Help Fight Cybercrime | GZERO World

How private businesses help fight cybercrime

The federal government wants to help US businesses better defend themselves against cyberattacks — but little can be done if corporations don't report them.

That's why the Biden administration is championing a new law that forces them to do so, says Jen Easterly, head of the Cybersecurity and Infrastructure Security Agency.

The Cyber Incident Reporting for Critical Infrastructure Act requires whoever operates critical infrastructure to report attacks coming from state and non-state actors.

Read moreShow less
Will the US be able to withstand cyber attacks on critical infrastructure?
Will the US Be Able to Withstand Cyber Attacks on Critical Infrastructure? | GZERO World

Will the US be able to withstand cyber attacks on critical infrastructure?

The US Cybersecurity and Infrastructure Security Agency was set up in 2018 to help protect America's critical infrastructure.

It might sound like a technical term, but CISA chief Jen Easterly explains that critical infrastructure is how we get water, power, gas — even food at the grocery store. And 80% of it is operated by the private sector.

So, how does the agency help businesses defend themselves from hackers?

Read moreShow less
US & allies unite against China's cyberattacks
Ian Bremmer: US & Allies Unite Against China's Cyberattacks | Quick Take | GZERO Media

US & allies unite against China's cyberattacks

Ian Bremmer's Quick Take:

Hi, everybody. Ian Bremmer here, back in Nantucket for a few days, and a Quick Take to start out the week.Well, I thought I would talk about the finger-pointing happening at China for these cyberattacks. When we've been talking about cyberattacks recently, we mostly talk about Russia. It's been ransomware, it's been espionage, it's been disinformation, and US election intervention and all of these things. But no, this week it is all about China, and specifically the White House had this unusually strong statement, citing concerns about China's, what they call, irresponsible and destabilizing behavior in cyberspace, specifically talking about a hack against the Microsoft Exchange Server that we found out about back in March. That is a big deal.

Read moreShow less
Combating cybercrime a focus at G7 and Biden-Putin summits
Combating Cybercrime a Focus at G7 and Biden-Putin Summits | Cyber In :60 | GZERO Media

Combating cybercrime a focus at G7 and Biden-Putin summits

Marietje Schaake, International Policy Director at Stanford's Cyber Policy Center, Eurasia Group senior advisor and former MEP, discusses trends in big tech, privacy protection and cyberspace:

Cyber issues took center stage at the G7 summit. Is there a consensus among world leaders on how to handle cyberweapons?

Well, depending on who is included, there is a growing consensus that the escalations of conflict in cyberspace must stop. And G7 leaders that are now all representing democracies did call on Russia to hold perpetrators of cybercrime that operate from within its borders to account. So, I guess hope dies last because laws in Russia prevents the extradition of suspects to the US, even if Vladimir Putin answered positively when Joe Biden asked for cooperation on that front. And when it comes to limiting the spread of tools that are used for hacking, surveillance and infiltration, the EU has just moved ahead and adopted new dual use regulations which reflect the concerns for human rights violations when journalists are targeted the way that Jamal Khashoggi was. So ending the proliferation of systems that are used to attack would be an urgent but also obvious step for democratic nations to agree on.

Read moreShow less
Cloud computing and US cybersecurity
Cloud Computing Is Key To Biden's Cybersecurity Strategy But Not Enough | Cyber In :60 | GZERO Media

Cloud computing and US cybersecurity

Marietje Schaake, International Policy Director at Stanford's Cyber Policy Center, Eurasia Group senior advisor and former MEP, discusses trends in big tech, privacy protection and cyberspace:

What is cloud computing?

Now it's not that easy to answer but let me give it a try. Cloud computing is the capacity to store or process data over the Internet on servers away from a device like a laptop or a mobile phone. And it actually allows for software, databases, and the storage of data to be sold as a service.

Read moreShow less
Highlights from our live conversation on cybersecurity challenges
Ian Bremmer: Cybersecurity Cooperation at Home & Abroad | Global Stage | GZERO Media

Highlights from our live conversation on cybersecurity challenges

Cyber is a tool, and sometimes a weapon. Whether used for commercial gain or for attacks on critical infrastructure, actions taken in cyberspace affect you directly. This means that even the most mundane realities of everyday life are vulnerable to hackers.

In our live May 18 event, "Beyond SolarWinds: Securing Cyberspace," we asked our speakers what we can do to safeguard cyberspace from future attacks.

Ian Bremmer, president of Eurasia Group and GZERO Media, (above) explains "there are three different levels of cooperation we desperately need to reduce a threat that right now is growing exponentially for our national securities at home." At one level, there needs to be greater coordination between the private and public sectors in the US. It needs to be "much deeper, much more structural, much more efficient" than what we currently have, says Bremmer.

Read moreShow less
DarkSide hack reveals risk of ransomware cyberattacks
DarkSide Hack Reveals Risk of Ransomware Cyberattacks | Cyber In :60 | GZERO Media

DarkSide hack reveals risk of ransomware cyberattacks

Marietje Schaake, International Policy Director at Stanford's Cyber Policy Center, Eurasia Group senior advisor and former MEP, discusses trends in big tech, privacy protection and cyberspace:

What did the DarkSide incident targeting Colonial Pipeline reveal about ransomware and the vulnerability of critical infrastructure?

Well, basically everything you need to know. The type of impact debilitating infrastructure through a ransomware or other method of cyberattack has been warned about for years. The risk of exploitation of vulnerabilities in software with enormous ripple effects became very tangible with the attack on Colonial Pipelines. But remember that energy infrastructure in the US already enjoys the highest protections, and still the attackers managed to perpetrate.

Read moreShow less

Subscribe to our free newsletter, GZERO Daily

Latest