Does Adding a Label Make Us More Secure?
When hackers recently breached the computer systems of the Bangladesh Central Bank and tried to steal nearly $1 billion from its account at the Federal […] More
When hackers recently breached the computer systems of the Bangladesh Central Bank and tried to steal nearly $1 billion from its account at the Federal […] More
The Sony Pictures Entertainment hack served as a very public wake-up call to the dangers posed by malicious hackers. In the course of the attacks, […] More
There’s still much to be learned about the unauthorized release of the so-called Panama Papers, the documents exposing the financial interests of prominent world figures […] More
In the nineteenth century, American strategist Alfred Thayer Mahan helped define a new understanding of maritime security and the role of the U.S. Navy in […] More
On March 11, President Barack Obama said that smartphones can’t be allowed to be “black boxes,” inaccessible to the government. It is apparent that the […] More
With advanced robotics, autonomous machines and nimbler space systems on the agenda for the U.S. military, the Department of Defense has turned its attention to […] More
The Justice Department has dropped its legal effort to force Apple to unlock the iPhone used by one of the shooters in the San Bernardino […] More
When you think of cybersecurity, you probably think about firewalls and passwords – but the ever-changing cyber threat has forced the technology to move far […] More
After years of public attention around Bitcoin, its underlying technology—the blockchain—is taking over the discussion with its potential to address fundamental challenges across a number […] More
Quantum cybersecurity covers the application of quantum technology to enhance cybersecurity. It includes quantum random number generation, which strengthens security through the delivery of stronger […] More
In the wake of a series of high-profile mass shootings, President Barack Obama initiated an executive action directing the Department of Defense, the Department of […] More
Gun technology itself hasn’t changed for the last 100 years, but now we are starting to see a new period of innovation through the integration […] More
The trend of making conventional objects “smart” is continuing unabated, and now even firearms are beginning to have computers integrated into them. The Cipher Brief […] More
The current dispute between Apple and the FBI amplifies the ongoing debate between U.S. tech firms and law enforcement agencies about encryption. At issue in […] More
Apple should not be coerced into hacking into the San Bernardino shooter’s iPhone, and we must get to a point as a society where law […] More
The current conflict between Apple and the FBI over developing a means to circumvent security features on the iPhone has reignited the tense debate about […] More
In February, Hollywood Presbyterian Hospital very publicly paid $17,000 to regain access to its files after being infected with a type of malware called ransomware. […] More
Healthcare providers represent an attractive target for hackers due to the wealth of information they store about their patients. The Cipher Brief Spoke to Greg […] More
Search