Ht-Logo-gigapixel-icon
Saturday, November 16, 2024
Canada’s Politics and Government News Source Since 1989
Saturday, November 16, 2024 | Latest Paper

David Skillicorn

David Skillicorn is a professor currently working in the School of Computing for Queen's University. He also works as an adjunct professor in the mathematics and computer science department of the Royal Military College.

Canada is not immune to cyberattacks

Opinion | BY DAVID SKILLICORN | May 11, 2022
The Communications Security Establishment, headed by chief Shelly Bruce, has worked hard over the past decade to secure the government’s presence in cyberspace, with departments themselves motivated by several high-profile attacks, writes David Skillicorn. The Hill Times photograph by Andrew Meade
Opinion | BY DAVID SKILLICORN | May 11, 2022
Opinion | BY DAVID SKILLICORN | May 11, 2022
The Communications Security Establishment, headed by chief Shelly Bruce, has worked hard over the past decade to secure the government’s presence in cyberspace, with departments themselves motivated by several high-profile attacks, writes David Skillicorn. The Hill Times photograph by Andrew Meade
Opinion | BY DAVID SKILLICORN | May 11, 2022
The Communications Security Establishment, headed by chief Shelly Bruce, has worked hard over the past decade to secure the government’s presence in cyberspace, with departments themselves motivated by several high-profile attacks, writes David Skillicorn. The Hill Times photograph by Andrew Meade
Opinion | BY DAVID SKILLICORN | May 11, 2022
Opinion | BY DAVID SKILLICORN | May 11, 2022
The Communications Security Establishment, headed by chief Shelly Bruce, has worked hard over the past decade to secure the government’s presence in cyberspace, with departments themselves motivated by several high-profile attacks, writes David Skillicorn. The Hill Times photograph by Andrew Meade
Opinion | BY DAVID SKILLICORN | November 20, 2019
Offensive cyber operations can be used with different levels of impact. At the lowest level, they can be used to disrupt an adversary’s online activities. At the highest level, cyberattacks are equivalent to kinetic attacks in terms of their devastation of an adversary’s infrastructure, writes David Skillicorn. Photograph courtesy of Pixabay
Opinion | BY DAVID SKILLICORN | November 20, 2019
Opinion | BY DAVID SKILLICORN | November 20, 2019
Offensive cyber operations can be used with different levels of impact. At the lowest level, they can be used to disrupt an adversary’s online activities. At the highest level, cyberattacks are equivalent to kinetic attacks in terms of their devastation of an adversary’s infrastructure, writes David Skillicorn. Photograph courtesy of Pixabay