Tech/Cyber

Punching Above its Weight

Iranian hacks into the social media accounts of U.S. State Department officials are the latest signal from Tehran that it is not looking to turn […] More

A Second-Tier Cyber Power

Iran is a second tier cyber power. By the standards of other state actors, its capabilities—both offensive and defensive—are relatively modest, but they are growing […] More

A "Brown Water" Navy

Through a series of attacks over the last three years, Iran has revealed a limited offensive cyber capability but a willingness to use it to […] More

Offensive Cyber Operations

Hollywood has a clear idea of what it would look like if someone used cyber-capabilities against us: a man in a room full of screens […] More

Statecraft in Cyberspace

Does the cyber domain call for a fundamentally different framework for achieving international order in the 21st century, requiring statesmen to critically rethink the art […] More

The Government’s Domain

As President and CEO of FusionX, Matt Devost focuses on cybersecurity and risk management.  Devost told The Cipher Brief that offensive cyber operations should rest […] More

The Debate Post-Paris

Twelve days after the Paris attacks, I was waiting for a flight at London’s Heathrow Airport, which seemed to be running with its customary sedate […] More

Safe Harbor 2.0

The safe harbour was a convenient fiction that enabled business-as-usual processes to take place between the EU and the U.S. Many were shocked when the […] More

Protecting the Cyber Supply Chain

Critical infrastructure organizations have large and complex IT networks built on top of an assortment of heterogeneous technologies.  Many large enterprises also extend their in-house […] More

Supply Chain Security

You would probably be surprised to know what a logistical feat it is to manufacture a smart phone. The base materials are mostly silicon, plastic […] More

Mitigating Third Party Risk

Over the past several decades, quality, health and safety, and environmental issues have topped the list of supply chain concerns. However, increasingly two issues are […] More

The Cyber Attribution Challenge

Nearly a year ago, we witnessed an act of cyber destruction directed against the networks of Sony Pictures Entertainment.  The destruction was serious and somewhat […] More

Search

Close