{{ subpage.title }}

US & allies unite against China's cyberattacks

Ian Bremmer's Quick Take:

Hi, everybody. Ian Bremmer here, back in Nantucket for a few days, and a Quick Take to start out the week.Well, I thought I would talk about the finger-pointing happening at China for these cyberattacks. When we've been talking about cyberattacks recently, we mostly talk about Russia. It's been ransomware, it's been espionage, it's been disinformation, and US election intervention and all of these things. But no, this week it is all about China, and specifically the White House had this unusually strong statement, citing concerns about China's, what they call, irresponsible and destabilizing behavior in cyberspace, specifically talking about a hack against the Microsoft Exchange Server that we found out about back in March. That is a big deal.

Read Now Show less

Combating cybercrime a focus at G7 and Biden-Putin summits

Marietje Schaake, International Policy Director at Stanford's Cyber Policy Center, Eurasia Group senior advisor and former MEP, discusses trends in big tech, privacy protection and cyberspace:

Cyber issues took center stage at the G7 summit. Is there a consensus among world leaders on how to handle cyberweapons?

Well, depending on who is included, there is a growing consensus that the escalations of conflict in cyberspace must stop. And G7 leaders that are now all representing democracies did call on Russia to hold perpetrators of cybercrime that operate from within its borders to account. So, I guess hope dies last because laws in Russia prevents the extradition of suspects to the US, even if Vladimir Putin answered positively when Joe Biden asked for cooperation on that front. And when it comes to limiting the spread of tools that are used for hacking, surveillance and infiltration, the EU has just moved ahead and adopted new dual use regulations which reflect the concerns for human rights violations when journalists are targeted the way that Jamal Khashoggi was. So ending the proliferation of systems that are used to attack would be an urgent but also obvious step for democratic nations to agree on.

Read Now Show less

Cloud computing and US cybersecurity

Marietje Schaake, International Policy Director at Stanford's Cyber Policy Center, Eurasia Group senior advisor and former MEP, discusses trends in big tech, privacy protection and cyberspace:

What is cloud computing?

Now it's not that easy to answer but let me give it a try. Cloud computing is the capacity to store or process data over the Internet on servers away from a device like a laptop or a mobile phone. And it actually allows for software, databases, and the storage of data to be sold as a service.

Read Now Show less

Highlights from our live conversation on cybersecurity challenges

Cyber is a tool, and sometimes a weapon. Whether used for commercial gain or for attacks on critical infrastructure, actions taken in cyberspace affect you directly. This means that even the most mundane realities of everyday life are vulnerable to hackers.

In our live May 18 event, "Beyond SolarWinds: Securing Cyberspace," we asked our speakers what we can do to safeguard cyberspace from future attacks.

Ian Bremmer, president of Eurasia Group and GZERO Media, (above) explains "there are three different levels of cooperation we desperately need to reduce a threat that right now is growing exponentially for our national securities at home." At one level, there needs to be greater coordination between the private and public sectors in the US. It needs to be "much deeper, much more structural, much more efficient" than what we currently have, says Bremmer.

Read Now Show less

DarkSide hack reveals risk of ransomware cyberattacks

Marietje Schaake, International Policy Director at Stanford's Cyber Policy Center, Eurasia Group senior advisor and former MEP, discusses trends in big tech, privacy protection and cyberspace:

What did the DarkSide incident targeting Colonial Pipeline reveal about ransomware and the vulnerability of critical infrastructure?

Well, basically everything you need to know. The type of impact debilitating infrastructure through a ransomware or other method of cyberattack has been warned about for years. The risk of exploitation of vulnerabilities in software with enormous ripple effects became very tangible with the attack on Colonial Pipelines. But remember that energy infrastructure in the US already enjoys the highest protections, and still the attackers managed to perpetrate.

Read Now Show less

Subscribe to GZERO Media's newsletter, Signal

Latest