Trusted Identities in Cyberspace Are More Important than Ever
It’s hard today to find a major breach where weak identity solutions did not provide the vector of attack. More than 21 million personnel records […] More
It’s hard today to find a major breach where weak identity solutions did not provide the vector of attack. More than 21 million personnel records […] More
Last month, Kurdish forces in northern Iraq shot down an Islamic State drone booby-trapped with explosives that later killed two Peshmerga soldiers as they inspected […] More
Drones have traditionally been used by Western militaries as a tool in counterterrorism efforts, but insurgent and terrorist groups are increasingly turning to small hobby […] More
There is growing evidence that non-state actors are incorporating drone technology into their unconventional tactics, prompting concerns from militaries on how they can effectively counter […] More
Americans will remember the 2016 U.S. Presidential Election as one of the most controversial in our history. Yet, debate extended beyond the fitness of the […] More
With elections around the corner and ongoing fears of Russian interference and vulnerabilities in electronic election systems, The Cipher Brief sat down with Rachel DeLevie-Orey […] More
On Tuesday, people around the United States will flood to local polling places to cast their vote for the future leadership of the United States. […] More
When it comes to cybersecurity preparations for the 2016 election, it is now officially too late. The success, perceived and actual, of the election on […] More
Defending and securing a nation and its people would be much easier if those tasked with the job were psychics, like the precogs in Steven […] More
Earlier this month, Director of National Intelligence (DNI) James Clapper described reaching out to the private sector as a “daunting task,” and that “there is […] More
All Americans – including both company executives and law enforcement officials across the nation – want to keep our country safe and secure. This shouldn’t […] More
At least twice in the past year, the U.S. was Twappled. That is, multibillion-dollar U.S. corporations used their significant position in their respective industry to […] More
As the military prepares for the transition to the next administration, the three service secretaries on Monday detailed their concerns about the challenges posed by […] More
Now that the Obama administration has publicly attributed the hacking of the Democratic National Committee and other political entities to “Russia’s senior-most officials,” the question […] More
After much hand-wringing, the U.S. publicly admitted that the Russian government is interfering with the Presidential election. This was an open secret for weeks, but […] More
Most political leaders understand that governments that fail to respond to public provocations by foreign states do so at their own risk. In recent years, […] More
The White House is looking to take a “proportional” response to Russia’s alleged hacking of U.S. political party organizations and effort to interfere in the […] More
October is National Cyber Security Awareness Month and The Cipher Brief is pulling together a Cyber Advisory Task Force made up of public and private […] More
Search