A Prime Target
On February 5th, Hollywood Presbyterian Medical Center lost access to its computers after being infected with ransomware – a type of malware that hold files […] More
On February 5th, Hollywood Presbyterian Medical Center lost access to its computers after being infected with ransomware – a type of malware that hold files […] More
Technologies meant to counter unmanned aerial vehicles (UAVs) are becoming more numerous as people become more concerned about bad actors using UAVs for illicit purposes. […] More
Growing interest in unmanned aerial vehicles (UAV or drone) has caused a surge in the creation of technologies and systems meant to disable or destroy […] More
Commercially available unmanned aerial vehicles (UAVs), popularly known as drones, appear to be changing the game in regards to aviation. The market for drones has […] More
Quantum computing is poised to usher in a new era in computing by allowing access to unprecedented speed and new problem solving capabilities. The Cipher […] More
Debates about encryption have been a hot button issue for some time, as privacy advocates and law-enforcement agencies debate about the merits of privacy versus […] More
There is a massive problem in cybersecurity, and it has been growing for years. This problem is not a malicious program, or a rogue nation-state, […] More
There is a dearth of talent in the cybersecurity industry, and the talent that does exist tends to be very specific, with some skill sets […] More
Industry data regarding the cybersecurity skills shortage continues to paint a disturbing picture. For example: “The Cipher Brief has become the most popular outlet for […] More
A serious, potential malware threat has been detected on the systems that control many aspects of critical infrastructure in the United States. These industrial control […] More
Industrial control systems (ICS) underly many aspects of our critical infrastructure, and there are concerns that they are becoming more vulnerable to hackers. The Cipher […] More
Industrial control systems are a profoundly important part of the critical infrastructure of the United States, but they are also increasingly vulnerable to cyber-attacks. The […] More
Search