Just as it avoids direct confrontation with the U.S. on the battlefield, Tehran will avoid an all-out war in the digital arena. But it will also use online proxies and mercenaries to mask its involvement in lower-level cyberattacks.
This graphic explores the intersection between ideological freedom and online regulation.
Using the carrot-and-the-stick approach, Western governments are pushing businesses to beef up their cybersecurity.
Newly revealed Department of Justice documents lay bare the extent of Beijing's efforts to acquire information and technology at any cost. Now, recognizing the scale of the threat, Washington is looking to fight back.
After U.S., Dutch and U.K. security officials announce the arrests and indictments of several Russian agents, open source investigators dig up the true identities of some of them, as well as information embarrassing to the intelligence agency.
A report that China has inserted specialized chips on U.S.-bound hardware may not be fully accurate, but that's unlikely to stop Washington from capitalizing on the story in its trade war with Beijing.
By Matthew Bey
Despite the Trump administration's new posture, the legal process, regulations and cooperation with the private sector likely will remain dominant parts of the U.S. cybersecurity mix.
Just about everybody uses social media, but too few truly understand it. That's why those looking to protect their organizations from hackers and other assailants would do well to grasp the ins and outs of such applications.