The Future of Cybersecurity
Cybersecurity has not only dominated the headlines in the wake of the U.S. Office of Personnel Management (OPM) and Sony hacks, it has become a […] More
Cybersecurity has not only dominated the headlines in the wake of the U.S. Office of Personnel Management (OPM) and Sony hacks, it has become a […] More
Davis Hake is the Director of Cybersecurity Strategy for Palo Alto Networks and a former official at the Department of Homeland Security. Hake spoke with […] More
Periodically, The Cipher Brief profiles an up and coming leader in the cybersecurity and national security fields. This week we introduce you to Angela Knox, […] More
Chris Young is the general manager of the Intel Security Group at the Intel Corporation, where he leads the company’s security practice. Young sat down […] More
To understand what domestic and strategic factors may have encouraged Iran to seek stronger cyber-capabilities, it helps to look at the several ways Iran uses […] More
Iranian hacks into the social media accounts of U.S. State Department officials are the latest signal from Tehran that it is not looking to turn […] More
Iran is a second tier cyber power. By the standards of other state actors, its capabilities—both offensive and defensive—are relatively modest, but they are growing […] More
Through a series of attacks over the last three years, Iran has revealed a limited offensive cyber capability but a willingness to use it to […] More
The U.S.-China summit has concluded and the announced results provided little good news on the cyber front, at least for us. Beijing certainly got what […] More
The U.S. technology sector received a surprise jolt in October when the European Court of Justice struck down the Safe Harbor Framework, setting off a […] More
The European Union and the United States have been close allies for decades and “partners of first resort,” to use the words of both former […] More
Twelve days after the Paris attacks, I was waiting for a flight at London’s Heathrow Airport, which seemed to be running with its customary sedate […] More
The safe harbour was a convenient fiction that enabled business-as-usual processes to take place between the EU and the U.S. Many were shocked when the […] More
You would probably be surprised to know what a logistical feat it is to manufacture a smart phone. The base materials are mostly silicon, plastic […] More
Joe Jarzombek, a cybersecurity expert at the Department of Homeland Security, recently participated in the 2015 SSCA (Software and Supply Chain Assurance) Winter Working Group […] More
Over the past several decades, quality, health and safety, and environmental issues have topped the list of supply chain concerns. However, increasingly two issues are […] More
Critical infrastructure organizations have large and complex IT networks built on top of an assortment of heterogeneous technologies. Many large enterprises also extend their in-house […] More
Nearly a year ago, we witnessed an act of cyber destruction directed against the networks of Sony Pictures Entertainment. The destruction was serious and somewhat […] More
Search