Cyber and the Law
The past year has proven to be a contentious and disruptive time for the technology sector. The threat of home grown terrorism combined with the […] More
The past year has proven to be a contentious and disruptive time for the technology sector. The threat of home grown terrorism combined with the […] More
A hypersonic missile launched from mainland China could strike a U.S. carrier group located anywhere in the South China Sea in under 20 minutes. That’s […] More
The risk of attack or theft from cyber-enabled actors has been made extremely clear to both private businesses and governments. The last few years have […] More
Observers around the world were shocked when news broke about a major bank heist in Bangladesh. This was no ordinary robbery though – this time, […] More
There are two different types of insider threat: negligent and malicious. Negligent insiders are people who give attackers access by mistake. For example, the employee […] More
In the wake of a series of hacks against government and private networks, it is clear that Russia and China are among the most active […] More
Every day, the line between cyber-threats and physical threats grows thinner – blurring the crucial distinction between attacks on networks and attacks on materials objects. […] More
If my first day at Black Hat was all about insider threats and ransomware, my second was focused on attackers. I had the opportunity to […] More
The Cipher Brief’s Luke Penn-Hall is currently attending Black Hat, a premiere information security conference in Las Vegas, Nevada. Here’s his update from Day 1: […] More
The Office of Personnel Management (OPM) hack raised the threat of Chinese cyber-espionage in a way that the American people had never seen before. American […] More
The clash between the tech industry and the federal government over data access has become an enduring part of the national narrative about countering violent […] More
When it comes to cyber attacks, one of the biggest problems is correctly determining who, exactly, is attacking you. This is called attribution, and it […] More
One year ago, on July 10, 2015, Katherine Archuleta resigned her position as Director of the Office of Personnel Management (OPM) in the face of […] More
The speed at which drones went from classified military platforms to ubiquitous consumer products is staggering, and the next chapter in that proliferation is starting […] More
On Tuesday, it came to light that the Democratic National Convention’s (DNC) network had been breached by not one, but two different hacker groups that […] More
Nearly everyone has, at some point, had to deal with long, terrible commutes caused by traffic congestion at rush hour. Or maybe you have endured […] More
A group of terrorists leave their car to enter the home where they will plan their next attack, observed only by a hummingbird perched on […] More
You would think that radioactive isotopes, even those used for commercial purposes, would be tightly monitored and controlled. You would also be wrong. Radiological materials […] More
Like a slow-motion tsunami, the Internet of Things (IoT) is continuing to wash over an ever-greater portion of our lives, and now, our bodies. The […] More
Search