Update on the Cybersecurity Information Sharing Act
Despite the concerns of privacy advocates, the Senate has passed cybersecurity legislation, creating a process for the government and private industry to share information on […] More
Despite the concerns of privacy advocates, the Senate has passed cybersecurity legislation, creating a process for the government and private industry to share information on […] More
People are the weakest link in any cybersecurity system. Conversations about the cyber issue typically focus on systems, the primary targets of hackers and cyber […] More
The government is in a bind – it wants to stop criminals and terrorists, but it also wants to support strong encryption. Navigating this quandary […] More
“Are we so mistrustful of government—and of law enforcement—that we are willing to let bad guys walk away…willing to leave victims in search of justice?” […] More
There may be water on Mars, but there’s definitely liquor in orbit. Over the last couple of years, there have been a number of people […] More
The old saying goes that there are only two guarantees in life: death and taxes. But if you’re a Chief Security Officer, you may as […] More
It seems like drones are everywhere now. They started decades ago as a military tool, but today drones are very much a part of the […] More
Tonight, Republican candidates will take the stage for the second GOP Presidential debate. We’ve heard a lot about jobs, immigration and the economy – but […] More
Large-scale cyber attacks like those experienced by OPM, Sony, Anthem, and Target have intensified the ongoing criticism that the US government lacks a coherent cybersecurity […] More
Periodically, The Cipher Brief will explore outside-the-box technologies and unusual, sometimes weird, scientific innovations. You’ll see how the boundaries between reality and fantasy are growing thinner […] More
The U.S. depends heavily on military and commercial satellites. If a less satellite-dependent opponent launched an anti-satellite (ASAT) attack, it would have far greater impact […] More
The Office of Personnel Management (OPM) hack shocked the U.S., exposing the vulnerability of the U.S. government to cyber attack. After thieves took the personal […] More
By now you’ve probably heard about the two cybersecurity professionals who hacked a Jeep while it was in motion. Earlier this month, hackers at Def Con, a […] More
It’s Day 3 of Black Hat 2015, a major conference for cybersecurity professionals. With over 9,000 attendees expected, the conference addresses major issues facing top information security […] More
Cybercriminals are now using more advanced methods, once the exclusive domain of the state, to steal and profit from personal and proprietary information, blurring the […] More