Popular articles

Four principles of strategic stability

It is possible, at least conceptually, to sketch out a set of broad principles for U.S-Russian strategic stability – those principles are rooted in Cold War legacies but need to be adapted, revisited, and broadened in light of changing strategic capabilities a...

On October 20, 2018, President Donald Trump announced that the United States is going to withdraw from the Intermediate-Range Nuclear Forces Treaty (INF Treaty). Many experts assumed that that Trump’s decision was caused not by the accusations that Russia violated the treaty but by concerns about Ch...

Some time ago the U.S. administration, including their former President Barack Obama, has voiced more and more often the idea that it would be desirable to continue strategic offensive reductions. There are several reasons why the United States are so interested in intensifying nuclear arms reduct...

All articles



How Do You Create a World Financial Community That Is Resilient in the Face of Cyber-Security, Cyber-Espionage, and Hacking?

William Abbott Foster, Hannah Thoreson

Today effective cyber defenses assume higher levels of trust for automated threat sharing, but increased threat sharing also increases one`s vulnerability to new kinds of targeted threats from those with who have learned about your weaknesses. We have moved from a simple world where a threat could be detected by a signature downloaded from an anti-virus firm like Macafee or Symantec and neutralized.

Now attackers will now probe thousands of network simultaneously with thousands of different attacks a second looking for an exploitable vulnerabilities.  These attacks are far  beyond the capability of human operator to identify, isolate, and respond to such attacks or to let those they trust in government and industry to know about the attack in a timely (sub-second) window.

The first step in building an automated defense to current threats, is to make the threat information software and hardware independent. The U.S. government think tank MITRE under contact to the US Department of Homeland Security has developed an XML based system for automatic structured threat information called STIX.


Online Section of PIR Center Program "International Information Security and Global Internet Governance"