The Classic Cyber Defense Methods Have Failed – What Comes Next?
                By Amir Averbuch and Gabi Siboni
INSS – CYBER Warfare Program
 
The classic defense methods employed throughout the world in recent decades are proving unsuccessful in halting modern...            
            
        The Effect of Cyberwar Technologies on Force Buildup: The Israeli Case
                By Gil Baram
INSS – CYBER Warfare Program
www.i-hls.com
The past decade has witnessed rapid developments in computers and information technology, leading to far reaching changes in almost all areas...            
            
        The Use of Code Mutation to Produce Multi-use Cyber Weapons
                By Cohen, Daniel and Rotbart, Aviv
INSS – CYBER Warfare Program 
The increasing use of cyber weapons is creating the inevitable situation in which sophisticated versions of cyber...            
            
        INSS Global Cyber Review – July 2013
                
 
 
Israel
Cisco to invest in Israeli cyber-security
Prime Minister, Benjamin Netanyahu, welcomes Cisco’s decision to establish an R&D lab in Israel and the cyber...            
            
        INSS Global Cyber Review – June 2013
                
Global Cyber
Review
Israel
Israel taking cyber security more seriously
Hezi Kalo, CEO of the Bank of Israel, recently stated that: "We are at war, something that does not...            
            
        INSS Global Cyber Review – June 2013
                
 
Global Cyber Review
 
 
Israel
Israel under constant threat of cyber-attack
 
 
Kaspersky Lab has revealed that in the first quarter of 2013, Israel identified almost a million network...            
            
        INSS Global Cyber Review: May 2013
                
Global Cyber
Review
 
USA
U.S. directly accuses China of cyber-attacks 
The Obama administration explicitly accused China’s military of mounting attacks on American government computer systems and defense contractors, saying...            
            
        INSS Global Cyber Review – May 2013
                 
 
i-HLS ISRAEL Homeland Security 
 
Israel
Israel’s cyber capabilities among the best in the world
 
 
According to a McAfee cyber capability report, Israel shared first place with two...            
            
        A Blueprint for Cyber Deterrence: Building Stability through Strength
                
By Frank J. Cilluffo, Sharon L. Cardash, and  George C. Salmoiraghi
INSS - Cyber Warfare Program
In many ways, deterrence in cyberspace is eminently more complicated...            
            
        INSS Global Cyber Review – April 2013
                
Israel
Israeli Government invests in the next generation of cyber experts
The Israeli government has decided to invest approximately 300m ILS to improve research and development...            
            
        In Defense of Stuxnet
                By James A. Lewis
INSS – Cyber Warfare Program
Revelations about Stuxnet and Flame have provoked a chorus of dire warnings on the dangers of cyber...            
            
        Cyber-crime: A National Security Issue?
                By Lior Tabansky
INSS – Cyber Warfare Program
Cyberspace, an offshoot of the development of computer and digital communications technologies, has in recent decades become part...            
            
        INSS Cyber Review – March 2013
                  
Israel - Planned cyber-attack against Israel uncovered
An anonymous organization planning to commit cyber-attacks against Israel in April 2013 has recently been uncovered.  The attackers, codenamed...            
            
        INSS Call for Papers
                The Israel institute for national security studies (INSS) invites researches from all over the world to submit papers that will be published in its...            
            
        Critical Infrastructure Protection against Cyber Threats
                
By Lior Tabansky
INSS – Cyber Warfare Program
.
Introduction
A functioning modern society depends on a complex tapestry of infrastructures: energy, communications, transportation, food, and many others....            
            
        Cyberspace and Terrorist Organizations
                By Yoram Schweitzer, Gabi Siboni, and Einav Yogev
NSS – Cyber Warfare Program
In a scene in the 1990 movie Die Hard 2, terrorists take control...            
            
        The Strategic Uses of Ambiguity in Cyberspace
                By Martin C. Libicki
INSS – Cyber Warfare Program
לעברית לחץ כאן
Strategic ambiguity has an honored place in the mores of statecraft. The studied unwillingness of...            
            
        Unraveling the Stuxnet Effect of Much Persistence and Little Change in...
                By Myriam Dunn Cavelty
INSS – Military and Strategic Affairs Program
 לעברית - לחץ כאן
The purpose of this article is giving a balanced picture of the...            
            
        Basic Concepts in Cyber Warfare
                by Lior Tabansky
INSS – Cyber Warfare Program
Introduction Developments in computers have made possible far reaching changes in all areas of life, and the rapid...            
            
        Cyber Warfare and Deterrence: Trends and Challenges in Research
                By Amir Lupovici
INSS – Cyber Warfare Program
 To read this article in Hebrew
.
In recent years a growing number of researchers have expanded the discussion of deterrence...            
            
        “MADE IN CHINA” CYBER
                
To read this article in Hebrew
.
.
By Dr. Gabi Siboni and Y. R.
Introduction
Over the past several years China has been developing operational capabilities in the...            
            
        IRAN ON THE CYBER OFFENSIVE
                by Dana Schwarz
INSS – Cyber Warfare Program
 
Iran has put a great deal of effort into constructing a domestic and external cyber strategy. Domestically, the...            
            
        
 
            
