bindinghook Profile Banner
Binding Hook Profile
Binding Hook

@bindinghook

Followers
768
Following
747
Media
79
Statuses
910

Expert commentary on emerging tech and security. Send us your article ideas at [email protected]. Project from @VirtualRoutes

http://www.bindinghook.com
Joined July 2023
Don't wanna be here? Send us removal request.
@bindinghook
Binding Hook
3 days
In this month’s Hooked!, editor @katharinegk looks at some new details on the Great Firewall and recent Binding Hook articles on how countries from Japan to India are dealing with Chinese tech ascendency.
Tweet card summary image
bindinghook.com
The Koreans think it’s funny, the Germans apparently don’t
0
0
0
@bindinghook
Binding Hook
6 days
Just as China’s approach to cyber operations has developed, so has its counter-attribution strategy. Western attribution strategies haven’t kept pace, argues @weberv_ in his latest for Binding Hook:
Tweet card summary image
bindinghook.com
To effectively counter Chinese efforts, Western countries and their partners must adapt by expanding joint attribution, broadening global audiences, and pre-empting disinformation narratives.
0
1
2
@bindinghook
Binding Hook
10 days
Once hesitant, ‘middle powers’ like Singapore are now naming cyber actors, reshaping regional norms once dominated by Western nations. @BasuArindrajit and @GPriyandita look the exceptions:
Tweet card summary image
bindinghook.com
India and Indonesia’s reticent approach to publicly attributing cyberattacks is the result of strategic culture, insufficient technical capacity, and the lack of clear returns
0
1
4
@bindinghook
Binding Hook
12 days
🙌 This was Binding Hook Live — a day filled with incredible conversations and discussions on and off stage. Read more insights from Binding Hook Live by our Managing Editors James Shires and @Maxwsmeets: https://t.co/Al9U5NyEQT
0
2
3
@bindinghook
Binding Hook
13 days
Despite progress in #cyberresilience, Japan’s constitutional limits and pacifist strategic culture still restrain fully offensive cyber operations. Read more from @orfonline’s @AVIRAL96:
Tweet card summary image
bindinghook.com
Japan’s efforts to establish comprehensive cyber policy frameworks have not yet fully translated into effective external threat responses.
0
0
1
@bindinghook
Binding Hook
18 days
SMEs make up 99% of UK businesses but most lack #cyberinsurance – an essential tool for financial protection and business continuity after cyber incidents. New research from @SciTechgovuk looks at why:
Tweet card summary image
bindinghook.com
Recent research shows that SMEs are unaware of, and confused by cyber insurance, in addition to facing financial and technological constraints.
0
0
1
@bindinghook
Binding Hook
19 days
And second, they examine Indonesia and India’s somewhat hesitant approaches to attributing cyber operations in a world where more and more countries are taking stronger stands against cyber adversaries:
Tweet card summary image
bindinghook.com
India and Indonesia’s reticent approach to publicly attributing cyberattacks is the result of strategic culture, insufficient technical capacity, and the lack of clear returns
0
0
2
@bindinghook
Binding Hook
19 days
First, the authors analyse the reasoning behind the countries’ non-committal and flexible approaches to creating formal cyber strategies and designating official cyber ambassadors:
Tweet card summary image
bindinghook.com
Countries across the world are looking to clearly articulate their national cyber strategies and establish cyber envoys. Why have two increasingly important global players refrained from following...
1
0
2
@bindinghook
Binding Hook
19 days
Today Binding Hook is taking a deeper look at Indian and Indonesian approaches to cyber with a pair of articles by @BasuArindrajit and @GPriyandita on #cyberstrategies, #cyberdiplomacy, and #attribution.
1
2
5
@bindinghook
Binding Hook
24 days
At Binding Hook Live in London on Monday, the main topics of conversation were China, capitalism, and conflict. Managing editors James Shires and @Maxwsmeets share some of their observations:
Tweet card summary image
bindinghook.com
Themes of China, capitalism, and conflict wove throughout the day of Binding Hook’s first live event
0
0
1
@bindinghook
Binding Hook
1 month
While @Microsoft's ban on IDF Unit 8200 using some Azure services might not have been October’s biggest web service provider story, it could have important lasting impacts. Read more in this month’s Hooked!
Tweet card summary image
bindinghook.com
In a first, a big American tech company has cut off some IDF access to some services, raising questions about tech neutrality, digital sovereignty, and the wider impacts of the latest war.
0
1
2
@bindinghook
Binding Hook
1 month
In his latest for Binding Hook, @Lawrence_Sec looks at how internet service providers work within the system to evade sanctions and enable #cyberattacks and #disinformation campaigns:
Tweet card summary image
bindinghook.com
Internet service providers and hosting companies enable cybercrime and cyber operations. Why don’t sanctions stop them?
0
3
6
@bindinghook
Binding Hook
1 month
#Surveillance has become central to #counterterrorism in democracies, but its spread into daily life raises a key question: how much monitoring can a free society absorb without losing trust?
Tweet card summary image
bindinghook.com
Surveillance technologies have become central to democratic counterterrorism, reshaping how citizens relate to the state. By extending into everyday life, these tools not only promise protection but...
0
0
4
@bindinghook
Binding Hook
1 month
If the EU wants to strengthen its cyber defences, it must move beyond bureaucracy and forge a true culture of #civilmilitarycooperation, writes @VirtualRoutes fellow Isabella Neumann in Binding Hook:
Tweet card summary image
bindinghook.com
The EU must foster a culture of civil-military collaboration to effectively counter cyber threats.
0
0
4
@bindinghook
Binding Hook
1 month
The EU’s push for hashtag#digitalsovereignty has raised questions about reliance on foreign companies for sensitive tech like policing software. Ausma Bernot looks to China for answers in her latest:
Tweet card summary image
bindinghook.com
Europe’s reliance on US tech giants for law enforcement tools collides with its sovereignty agenda, inviting a closer look at how China’s state-centric model balances innovation and control.
0
0
3
@bindinghook
Binding Hook
2 months
Ukraine’s intelligence service announced in July that it had gained full access to Russian servers in Crimea, extracting over 100 terabytes of data. But what purpose does this openness serve?
Tweet card summary image
bindinghook.com
Ukraine’s military intelligence service has turned cyber self-attribution into a weapon, claiming responsibility for operations to disrupt Russia and using visibility as a tool of strategic communi...
0
0
2
@RUSI_org
RUSI
2 months
Following the cyberattack on Jaguar Land Rover (JLR), RUSI's Gareth Mott (with @jasonnurse and @tjohansmeyer) argue that we must look past the headline figures for corporate losses and focus on the economic security of the hundreds of thousands of workers in JLR's supply chain.
@bindinghook
Binding Hook
2 months
Last month’s #JaguarLandRovercyberattack may cost £3.5B in revenue, but the bigger issue is the impact on 230,000 workers at JLR and in the supply chain facing layoffs, work reductions, and lost wages.
0
4
8
@bindinghook
Binding Hook
2 months
🗓️ #BindingHookLive agenda is out now! Check it out & request your invite: https://t.co/4JYpzfK8QL
0
1
1
@bindinghook
Binding Hook
2 months
Last month’s #JaguarLandRovercyberattack may cost £3.5B in revenue, but the bigger issue is the impact on 230,000 workers at JLR and in the supply chain facing layoffs, work reductions, and lost wages.
Tweet card summary image
bindinghook.com
Cyber incidents impacting key national industries highlight the need for better approaches to protect the individuals who suffer most
0
2
4
@bindinghook
Binding Hook
2 months
About 100,000 North Koreans work abroad in fields other than IT, earning the regime $500M a year. Most wages go back to Pyongyang, despite sanctions. Labour exports are central to its strategy. Read more from @Kritikaroy_26:
Tweet card summary image
bindinghook.com
A largely unseen army of IT operatives quietly infiltrates global networks and secures foreign currency as part of a system Pyongyang has honed over decades through the strategic export of its labour...
0
0
3