Cyber and the Law
The past year has proven to be a contentious and disruptive time for the technology sector. The threat of home grown terrorism combined with the […] More
The past year has proven to be a contentious and disruptive time for the technology sector. The threat of home grown terrorism combined with the […] More
As cyber attacks against U.S. government and private networks have increased in severity in recent years, the Congress and President have actively sought to identify, […] More
A confusing legal landscape and ever changing technology has created a challenging environment for businesses to navigate. The Cipher Brief recently spoke to Chris Pogue, […] More
The risk of attack or theft from cyber-enabled actors has been made extremely clear to both private businesses and governments. The last few years have […] More
As more and more business is conducted online and cyber criminals target in on a very lucrative market, both the public and private sector face […] More
Whether it’s your phone, your computer, TV, or even a refrigerator, all those connected devices that we depend on in our daily lives have become […] More
Observers around the world were shocked when news broke about a major bank heist in Bangladesh. This was no ordinary robbery though – this time, […] More
Cyber threats pose a challenge to banks and firms operating in the financial sector, primarily due to the fact that “vulnerability really exists everywhere,” both […] More
The Cipher Brief sat down with Steven Grossman, VP of Strategy and Enablement at Bay Dynamics, to discuss the current cyber threat landscape facing the […] More
Yahoo has announced hackers, believed to be state-sponsored, stole data on around 500 million users in 2014. The Cipher Brief’s Kaitlin Lavinder spoke with Vitali […] More
Behavioral profiling plays an important role in the wider effort to counter cyber threats, explains Steve Bongardt, VP of Security Consulting Services at Fidelis Cybersecurity. […] More
There are two different types of insider threat: negligent and malicious. Negligent insiders are people who give attackers access by mistake. For example, the employee […] More
The Cipher Brief sat down with Stuart Clarke, Chief Technical Officer for Cybersecurity at Nuix, to discuss how the visualization of data plays a critical […] More
The U.S. government continues to face a “trust deficit” with the technology community and must emphasize building relationships with the private sector in order to […] More
In the wake of a series of hacks against government and private networks, it is clear that Russia and China are among the most active […] More
The Cipher Brief spoke with Justin Harvey, CSO of Fidelis Cybersecurity, about the cyber threats posed by both China and Russia. According to Harvey, although […] More
Every day, the line between cyber-threats and physical threats grows thinner – blurring the crucial distinction between attacks on networks and attacks on materials objects. […] More
The Cipher Brief’s Luke Penn-Hall sat down with Steve Grobman, Intel Fellow and Chief Technology Officer for Intel Security, at the annual Black Hat cybersecurity […] More
Search