Identity in Cyberspace: The Advent of Biometrics Authentication
Cyberspace has grown into a vital domain of everyday life—we work, socialize, play, and conduct financial transactions online. Our lives now have a digital touch, […] More
Cyberspace has grown into a vital domain of everyday life—we work, socialize, play, and conduct financial transactions online. Our lives now have a digital touch, […] More
The use of biometrics to authenticate identity has been the subject of great debate for years, with opposing sides arguing its value for security, privacy, […] More
Amidst a rash of data breaches where compromised passwords provided the vector of attack – think Target, Anthem, OPM, or more recently, the Democratic National […] More
For this year’s Thanksgiving Day feature, The Cipher Brief revisits its coverage of the innovation and procurement challenges behind the F-35 Lighting II. As production […] More
For this year’s Thanksgiving Day feature, The Cipher Brief revisits its coverage of the innovation and procurement challenges behind the F-35 Lighting II. As production […] More
Should humans delegate the responsibility of decisions over life and death to computer algorithms? The answer is not as simple as it seems—and it is […] More
Discussions on artificial intelligence (AI) too often revolve around concerns about the sensationalist threat of “killer robots,” usually featured in science-fiction films or computer games. […] More
New technologies are changing the face of future warfare and few will be as impactful as the fusion of artificial intelligence into weapons systems. The […] More
Drones have traditionally been used by Western militaries as a tool in counterterrorism efforts, but insurgent and terrorist groups are increasingly turning to small hobby […] More
There is growing evidence that non-state actors are incorporating drone technology into their unconventional tactics, prompting concerns from militaries on how they can effectively counter […] More
Last month, Kurdish forces in northern Iraq shot down an Islamic State drone booby-trapped with explosives that later killed two Peshmerga soldiers as they inspected […] More
On Tuesday, people around the United States will flood to local polling places to cast their vote for the future leadership of the United States. […] More
When it comes to cybersecurity preparations for the 2016 election, it is now officially too late. The success, perceived and actual, of the election on […] More
With elections around the corner and ongoing fears of Russian interference and vulnerabilities in electronic election systems, The Cipher Brief sat down with Rachel DeLevie-Orey […] More
Earlier this month, Director of National Intelligence (DNI) James Clapper described reaching out to the private sector as a “daunting task,” and that “there is […] More
All Americans – including both company executives and law enforcement officials across the nation – want to keep our country safe and secure. This shouldn’t […] More
At least twice in the past year, the U.S. was Twappled. That is, multibillion-dollar U.S. corporations used their significant position in their respective industry to […] More
Now that the Obama administration has publicly attributed the hacking of the Democratic National Committee and other political entities to “Russia’s senior-most officials,” the question […] More
Search