Cyber

The Future of Cybersecurity

Cybersecurity has not only dominated the headlines in the wake of the U.S. Office of Personnel Management (OPM) and Sony hacks, it has become a […] More

A Pivotal Moment

Periodically, The Cipher Brief profiles an up and coming leader in the cybersecurity and national security fields.   This week we introduce you to Angela Knox, […] More

Staying Ahead of the Threat

Chris Young is the general manager of the Intel Security Group at the Intel Corporation, where he leads the company’s security practice. Young sat down […] More

Iran: A Rising Cyber Power?

To understand what domestic and strategic factors may have encouraged Iran to seek stronger cyber-capabilities, it helps to look at the several ways Iran uses […] More

Punching Above its Weight

Iranian hacks into the social media accounts of U.S. State Department officials are the latest signal from Tehran that it is not looking to turn […] More

A Second-Tier Cyber Power

Iran is a second tier cyber power. By the standards of other state actors, its capabilities—both offensive and defensive—are relatively modest, but they are growing […] More

A "Brown Water" Navy

Through a series of attacks over the last three years, Iran has revealed a limited offensive cyber capability but a willingness to use it to […] More

The Debate Post-Paris

Twelve days after the Paris attacks, I was waiting for a flight at London’s Heathrow Airport, which seemed to be running with its customary sedate […] More

Safe Harbor 2.0

The safe harbour was a convenient fiction that enabled business-as-usual processes to take place between the EU and the U.S. Many were shocked when the […] More

Supply Chain Security

You would probably be surprised to know what a logistical feat it is to manufacture a smart phone. The base materials are mostly silicon, plastic […] More

Mitigating Third Party Risk

Over the past several decades, quality, health and safety, and environmental issues have topped the list of supply chain concerns. However, increasingly two issues are […] More

Protecting the Cyber Supply Chain

Critical infrastructure organizations have large and complex IT networks built on top of an assortment of heterogeneous technologies.  Many large enterprises also extend their in-house […] More

The Cyber Attribution Challenge

Nearly a year ago, we witnessed an act of cyber destruction directed against the networks of Sony Pictures Entertainment.  The destruction was serious and somewhat […] More

Search

Close