Shifting to the Cloud: A Security Benefit for the Department of Defense
The modern data center is evolving like few ever thought possible, and this progression is in play across the public and private sector for good […] More
The modern data center is evolving like few ever thought possible, and this progression is in play across the public and private sector for good […] More
The process of radicalization, by which disaffected members of society are convinced to embrace violent means to pursue the goals of a terrorist ideology, has […] More
The Cipher Brief’s Bennett Seftel sat down with Charlie Allen, former Under Secretary for Security and Analysis at the U.S. Department of Homeland Security, to […] More
How far-fetched are James Bond’s gadgets or shows like Mission Impossible, where under-cover agents switch into different disguises? Not as far-fetched as you think. The […] More
Some may remember the Hypercolor t-shirt of the 1990s. Made of a thermochromic material, the shirts represent an early example of a “smart material.” As […] More
The term “political Islam” has become commonplace after the Arab uprisings of 2011, during which Islamist groups rose to political prominence across the Middle East […] More
The concept of political Islam has deep historical roots in Islamic societies and, during the Arab Spring uprisings of 2011 in the Middle East and […] More
Usage of the term political Islam has become common in recent years as Islamist movements vie for influence in a changing Middle East. However, the […] More
Department of Homeland Security Secretary John Kelly warned against the “real” and increasingly sophisticated threat from the nexus between criminal and terrorist networks as he […] More
False flag operations have been routine ploys in espionage and warfare for centuries. Now they have turned up in cyber operations. The Cipher Brief spoke […] More
How can a government, or a company, determine who launched a cyber attack? Attribution becomes even more difficult when the attackers disguise themselves as others. […] More
A false flag operation – pretending to be someone else while conducting spycraft or warfare – is an age-old tactic. With the advent of cyber […] More
U.S. Vice President Mike Pence visited the Demilitarized Zone (DMZ) separating North and South Korea on Monday and warned Pyongyang the “patience” of the U.S. […] More
Mahmoud Ahmadinejad, the firebrand former Iranian president, stunned observers last week by submitting his name as a candidate in his country’s presidential elections next month, […] More
Zero-day vulnerabilities — security flaws in commercial software or hardware for which developers haven’t devised a patch — have existed since the dawn of the […] More
China Merchants Port Holdings has invested $400 million to build China’s first port in Africa. The massive project, now under construction in Djibouti, will serve […] More
Decades ago, China saw economic partnerships with African nations as a means of securing political support. As China’s economy has evolved towards export manufacture, its […] More
As China’s economic interests in Africa have expanded, its security interests have kept pace, to protect Chinese nationals and assets across the continent. To that […] More
Search