As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
This paper begins by tracing the itemization and sharing of threat information to ancient times. It then demonstrates how cybersecurity cannot be adequately addressed only by technology people and cannot be ignored because it is the core of warfare in the twenty-first century, renders the fog of war even foggier, and it is difficult to create “cyber borders.” The article also argues that cyber risk has greatly increased due to the Internet of Things (IoT), lack of sufficient security in new defense devices, and hackers. Recommendations are presented for developing a more robust cybersecurity architecture at the national and international levels which include various ways of sharing public-private information in this domain and incorporating a multitude of fields.