Back to main
Lukasz Olejnik
Security, Privacy & Tech Inquiries

Posts for "cyber risk"

Total 18 Posts

Exaggerated claims of disinformation efficiency considered harmful

Promoting disinformation out of proportions can cause harm. But how so, after all, it informs about the issue? Well, without this information, perhaps  the disinformation content would not reach wider audiences at all. The propagandists would have failed....   How to boost Russian propaganda? The SDA, Disinformation Factory, employed over 100 Read More

Updated Russian technology policy relating to cybersecurity - Cyber Agency to reconcile cyber conflicts?

Russia just released an interesting strategic document concerning “information security” (in their nomenclature this includes cybersecurity and more) with a view to “determine the main threats to international information security”, it supposedly complements the doctrine of information security, and more. I'll go through a few points below. Unlike Read More

Analysis of UK Integrated Report in scope of cyber operations

The UK just released its comprehensive report Integrated Review concerning future diplomatic and military capabilities. While the document discusses foreign policy, adversaries, and kinetic forces such as missiles, tanks, or nuclear weapons, it contains interesting tidbits about cybersecurity and cyberwarfare (and is perhaps analogical to the other one from France) Read More

Do we need more transparency of cyber operations doctrines?

There is no question that cybersecurity is among the key world challenges. As reports of cyber attacks increase, policy decisions follow. The creation of military cyber operations, including planning and conducting offensive or defensive activities in cyberspace to achieve strategic and military objectives, slowly become the standard. While the details Read More

Analysis of new European cybersecurity strategy and new NIS2 Directive

European Union showcased its new aims for cybersecurity (“strategy”), along with the new proposal for directives regulating cybersecurity, critical infrastructure, and end-to-end encryption. The strategy goes first. Strategic EU focus on cybersecurity? The strategy contains several interesting points, for example: European DNS European DNS resolver system. This point is critical Read More

Initial data protection assessment of quantum computing

Quantum computers benefit from special effects like the quantum superposition and quantum interference to perform computation outside the reach to to classical computers, and attaining a speed advantage over classical computers for selected problems. What matters is quantum computers may allow an exponential computing speedup for certain problems. This speedup Read More

Cyber risk theme and COVID-19 - why scams or unauthorized access attempts using coronavirus theme is something unwelcome but unprecedentedly risky

I wanted to steer clear from the topic of SARS-CoV-19. But it is now clear that thee global coronavirus epidemic/spread introduces an extraordinary situation, warranting special considerations for individual and organization, as well as collective cybersecurity. We are all in this is due to a confluence of many related Read More