One of the first indicators of an army’s performance is its logistical capacity. When high-intensity operations are deployed, there simply are few countries which have the...
Sterling whipsawed on Thursday, first tumbling and then rallying, and experiencing robust volatility. The GBP/JPY also experienced a wild ride as the yen increased in value...
German industrial power and quality levels became a national symbol in the latter part of the 20th century, and to some extent the lifeboat of post-war...
Cyber offensive technology (a malware that is employed for military use) gives clear asymmetric advantage which favours weaker states and non-state actors. They may pursue cyber...
To begin with, the notion that a state can be vulnerable to a strategic surprise attack is one of the main discourses in cyber debate. A...
Historically war focused on public contests which involve arms, e.g. Gentili’s concept of war. The main goal of such contests is to inflict damage to soldiers...
Stuxnet was a malware which affected an Iranian nuclear facility (along with couple of other industrial sites across the world). It was found in 2010 but...
If a country is hit with a computer program and there is destruction/death involved, there is usually retaliation, a counter attack and an appropriate response. An...
The new regulations established by the European Securities and Markets Authority (ESMA) are drawing closer and brokers are fidgeting. The implementation date of these rules that...
While many people are happy to go on vacation at a particular time of the year, there are some locations where the weather is so hot...