A Multidisciplinary Analysis of Cyber Information Sharing
                The emergence of the cyber threat phenomenon is forcing organizations to change the way they think about security. One of these changes relates to...            
            
        Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI
                
July 15th, 2014
ISRAEL
Operation Protective Edge hits cyber realm
As Operation Edge rages on, hackers have increased their attempts to breach Israel, and while most of...            
            
        INSS Global Cyber Review – June 2013
                
Global Cyber
Review
Israel
Israel taking cyber security more seriously
Hezi Kalo, CEO of the Bank of Israel, recently stated that: "We are at war, something that does not...            
            
        Critical Infrastructure Protection against Cyber Threats
                
By Lior Tabansky
INSS – Cyber Warfare Program
.
Introduction
A functioning modern society depends on a complex tapestry of infrastructures: energy, communications, transportation, food, and many others....            
            
        The Classic Cyber Defense Methods Have Failed – What Comes Next?
                By Amir Averbuch and Gabi Siboni
INSS – CYBER Warfare Program
 
The classic defense methods employed throughout the world in recent decades are proving unsuccessful in halting modern...            
            
        INSS Global Cyber Review: May 2013
                
Global Cyber
Review
 
USA
U.S. directly accuses China of cyber-attacks 
The Obama administration explicitly accused China’s military of mounting attacks on American government computer systems and defense contractors, saying...            
            
        INSS Global Cyber Review: January 1st
                
Israel
Iranian hackers claim to have extracted personal details of top Israelis army officers
An Iranian linked hacker claimed to infiltrate the Israeli Defense Force (IDF)...            
            
        Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI
                
March 15th, 2014
Israel
Two weeks of diverse cyber-attacks in Israeli cyberspace
Since the start of the month, Israeli companies are experiencing numerous cyber-attacks. One of the...            
            
        In Defense of Stuxnet
                By James A. Lewis
INSS – Cyber Warfare Program
Revelations about Stuxnet and Flame have provoked a chorus of dire warnings on the dangers of cyber...            
            
        Cyber Weapons and International Stability: New Destabilization Threats Require New Security...
                 By Guy-Philippe Goldstein
INSS – Military and Strategic Affairs Program
Though cyberspace is a domain of strategic importance, cyber weapons have not yet been associated with publicly well-enunciated...            
            
        IRAN ON THE CYBER OFFENSIVE
                by Dana Schwarz
INSS – Cyber Warfare Program
 
Iran has put a great deal of effort into constructing a domestic and external cyber strategy. Domestically, the...            
            
        Basic Concepts in Cyber Warfare
                by Lior Tabansky
INSS – Cyber Warfare Program
Introduction Developments in computers have made possible far reaching changes in all areas of life, and the rapid...            
            
        A Blueprint for Cyber Deterrence: Building Stability through Strength
                
By Frank J. Cilluffo, Sharon L. Cardash, and  George C. Salmoiraghi
INSS - Cyber Warfare Program
In many ways, deterrence in cyberspace is eminently more complicated...            
            
        INSS Global Cyber Review – November 1st
                
Israel
Israel counters a Chinese cyber attack
Israeli Channel 2 TV News reported last Sunday Israel's counter-cyber terrorism unit managed to thwart a concerted cyber-attack and...            
            
        Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI
                
February 15th, 2014
Israel
Israel - A growing cyber nation
In the last few years, the number of Israeli companies involved in the industry has ballooned from...            
            
        The Effect of Cyberwar Technologies on Force Buildup: The Israeli Case
                By Gil Baram
INSS – CYBER Warfare Program
www.i-hls.com
The past decade has witnessed rapid developments in computers and information technology, leading to far reaching changes in almost all areas...            
            
        INSS Global Cyber Review – October 15th
                
Israel
Beer Sheva, the future cyber capital of Israel.
After Prime Minister of Israel, Benyamin Netanyahu, inaugurated the Beer Sheva's cyber security park in September, Israeli...            
            
        INSS Global Cyber Review – April 2013
                
Israel
Israeli Government invests in the next generation of cyber experts
The Israeli government has decided to invest approximately 300m ILS to improve research and development...            
            
        Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI
                
March 1st, 2014
Israel
New opportunities and new challenges in cyber sector
Israel’s cyber industry is gaining another big boost from the People's Republic of China. WBP...            
            
        INSS Global Cyber Review
                
Israel
Israel: IBM Bought the Israeli cyber security company Trusteer
IBM signed an agreement to acquire cyber security company Trusteer, and plans to set up a...            
            
        Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI
                
July 1, 2014
ISRAEL
Israel in top countries for cyber defense exportations
Israel National Cyber Bureau (INCB) published an astonishing statistic asserting Israel export of cyber related...            
            
        The Use of Code Mutation to Produce Multi-use Cyber Weapons
                By Cohen, Daniel and Rotbart, Aviv
INSS – CYBER Warfare Program 
The increasing use of cyber weapons is creating the inevitable situation in which sophisticated versions of cyber...            
            
        
 
            
