
Beijing’s Drive Towards Global Technological Supremacy
This brief is part of The Cipher Brief’s 2018 Annual Threat Report. Bottom Line: There are three prominent technological security concerns for the United States […] More
This brief is part of The Cipher Brief’s 2018 Annual Threat Report. Bottom Line: There are three prominent technological security concerns for the United States […] More
China’s state news agency Xinhua, has shown the world just how far China has come in the artificial intelligence race with the introduction of a […] More
October is National Cybersecurity Awareness month in the U.S., an initiative started 15 years ago as a collaborative effort between the Department of Homeland Security […] More
With the last few years of progress in artificial intelligence, it is hard to look forward without excitement…and apprehension. If you are paying attention at […] More
This article has been updated to include comments from Cipher Brief experts. On Monday, the U.S. and UK jointly blamed Moscow for cyber intrusions into […] More
The United States is in the midst of the most resounding policy shift on cyber conflict, one with profound implications for national security and the […] More
The Trump administration has accused Russia of a coordinated “multi-stage intrusion campaign” to hack into critical U.S. infrastructure networks and conduct “network reconnaissance” while attempting […] More
Bottom Line: Conflict follows humanity wherever it goes, and the world’s population is increasingly living in cities. Waning are the days of the Maoist blueprint […] More
Jason Healey recently posted an interesting piece on The Cipher Brief, US Cyber Command: “When faced with a bully…hit him harder.” Healey writes: “Cyber Command’s new […] More
Bottom Line: A spy’s tradecraft must constantly evolve because of the rapid changes of the digital age – especially the tools and skills required to […] More
Bottom Line: While President Donald Trump’s tweets at times unnerve America’s closest allies, especially those that attack U.S. intelligence and law enforcement, the “Five Eyes” […] More
Bottom Line: Russia’s use of private military contractors in Syria lends the Kremlin deniability that becomes problematic when the U.S. tries to calculate how to […] More
Bottom Line: While North Korea has put on a friendly face during the Olympic Games taking place along its southern border, the country’s hackers continue […] More
Cipher Brief Cyber Advisory Board members offer their views on threats to the U.S. power grid, as interviewed by Cipher Brief Publisher and CEO Suzanne […] More
Bottom Line: Cyber vigilantes and “hacktivists” increasingly fill the void left by governments in combating terrorist activity online. While such politically motivated non-state hackers are […] More
Cybersecurity researchers have discovered two major software vulnerabilities in the Intel microprocessors inside the vast majority of all computers. Dubbed “Meltdown” and “Spectre,” the vulnerabilities […] More
Bottom Line: U.S. cyber defenders know how to take down botnets – networks of computers that have been hacked to act as one – but […] More
For this last week of 2017, we asked our experts to look ahead at key national security issues. NSA veteran Rick Ledgett offers some cybersecurity lessons […] More
Search