Punching Above its Weight
Iranian hacks into the social media accounts of U.S. State Department officials are the latest signal from Tehran that it is not looking to turn […] More
Iranian hacks into the social media accounts of U.S. State Department officials are the latest signal from Tehran that it is not looking to turn […] More
Iran is a second tier cyber power. By the standards of other state actors, its capabilities—both offensive and defensive—are relatively modest, but they are growing […] More
Through a series of attacks over the last three years, Iran has revealed a limited offensive cyber capability but a willingness to use it to […] More
Hollywood has a clear idea of what it would look like if someone used cyber-capabilities against us: a man in a room full of screens […] More
David Navetta is an attorney who focuses primarily on technology, privacy, information security, and intellectual property law at Norton Rose Fulbright. In an interview with […] More
Does the cyber domain call for a fundamentally different framework for achieving international order in the 21st century, requiring statesmen to critically rethink the art […] More
As President and CEO of FusionX, Matt Devost focuses on cybersecurity and risk management. Devost told The Cipher Brief that offensive cyber operations should rest […] More
“But what is new is that the small fry also have the power of betrayal…Science, adding to our armoury, continually demands more mechanics and more […] More
The U.S.-China summit has concluded and the announced results provided little good news on the cyber front, at least for us. Beijing certainly got what […] More
The U.S. technology sector received a surprise jolt in October when the European Court of Justice struck down the Safe Harbor Framework, setting off a […] More
The European Union and the United States have been close allies for decades and “partners of first resort,” to use the words of both former […] More
Twelve days after the Paris attacks, I was waiting for a flight at London’s Heathrow Airport, which seemed to be running with its customary sedate […] More
The safe harbour was a convenient fiction that enabled business-as-usual processes to take place between the EU and the U.S. Many were shocked when the […] More
Critical infrastructure organizations have large and complex IT networks built on top of an assortment of heterogeneous technologies. Many large enterprises also extend their in-house […] More
You would probably be surprised to know what a logistical feat it is to manufacture a smart phone. The base materials are mostly silicon, plastic […] More
Joe Jarzombek, a cybersecurity expert at the Department of Homeland Security, recently participated in the 2015 SSCA (Software and Supply Chain Assurance) Winter Working Group […] More
Over the past several decades, quality, health and safety, and environmental issues have topped the list of supply chain concerns. However, increasingly two issues are […] More
Nearly a year ago, we witnessed an act of cyber destruction directed against the networks of Sony Pictures Entertainment. The destruction was serious and somewhat […] More
Search