The Arab leaders did endorse the air campaign in Yemen requested by Yemeni President Hadi, now in exile. The summit also called for a meeting of Arab military chiefs of staff to be held within a month to begin working out operational details and planning for a joint military force. The military chiefs will then report on their plans three months later to a meeting of the Arab League’s Joint Defense Council. Kuwait, Egypt and Morocco will lead the planning as the former, present and future chairs of the Arab League. The force will be voluntary— join if you want— not required of member states. ”
“The decision by the 21 nations of the Arab League to create a joint military force because of the crisis in Yemen raises the question: Why didn’t the organization mobilize the same way to fight ISIS in Iraq? Matt Bradley of The Wall Street Journal joins Hari Sreenivasan via Skype from Erbil, Iraq, to discuss the muddled situation.”
Hamil Al-Bushra is a known ’emissary’ of the Islamic State, has conducted cyber-diplomacy to expand the clout of this terrorist organization. He has urged Al-Qaeda affiliates, such as Al-Shabaab, to pledge Ba’yah to the ISIS.
Editor’s Note:Deepak Jeevankumar is an enterprise IT investor at General Catalyst Partners where he has a wide range of investments in cybersecurity, big data and storage startups.The opinions expressed here are Deepak’s personal opinions and do not reflect the views of General Catalyst or their portfolio companies.
Kudos to the President for visiting Silicon Valley last month and drawing the attention of the nation to a new world of continuous cyber attacks.
The executive order signed by the President addresses the critical piece that is needed to help companies protect themselves in the future – by sharing cyber threat information between different private sector companies, and between the government and the private sector.
But we need to cross the cybersecurity trust chasm to make sharing really work.
Today, this trust has been broken in the system due to incessant hacking of employee/customer confidential data stored in private…