Cybersecurity in 2016
In 2016, the gap between threat actors and the cybersecurity industry will continue to expand. The security industry continues to fight the cyber battles with […] More
In 2016, the gap between threat actors and the cybersecurity industry will continue to expand. The security industry continues to fight the cyber battles with […] More
With the proliferation of many advanced security tools, enterprise and C-Suite managers have recently turned to deploying the most fashionable, powerful, and popular tools on […] More
Large businesses in the United States are putting substantial resources into protecting their information from cybersecurity threats. As a result, they are tougher targets for […] More
Justin Zeefe is a co-founder and Chief Strategy Officer for the Nisos Group. Zeefe spoke with The Cipher Brief about the evolving cyber-threat and how […] More
Few businesses today would think of operating without liability, property, or workers’ compensation insurance and yet, according to a recent survey by CSO magazine, only […] More
Periodically, The Cipher Brief profiles an up and coming leader in the cybersecurity and national security fields. This week we introduce you to Angela Knox, […] More
Chris Young is the general manager of the Intel Security Group at the Intel Corporation, where he leads the company’s security practice. Young sat down […] More
Cybersecurity has not only dominated the headlines in the wake of the U.S. Office of Personnel Management (OPM) and Sony hacks, it has become a […] More
Davis Hake is the Director of Cybersecurity Strategy for Palo Alto Networks and a former official at the Department of Homeland Security. Hake spoke with […] More
To understand what domestic and strategic factors may have encouraged Iran to seek stronger cyber-capabilities, it helps to look at the several ways Iran uses […] More
Iranian hacks into the social media accounts of U.S. State Department officials are the latest signal from Tehran that it is not looking to turn […] More
Iran is a second tier cyber power. By the standards of other state actors, its capabilities—both offensive and defensive—are relatively modest, but they are growing […] More
Through a series of attacks over the last three years, Iran has revealed a limited offensive cyber capability but a willingness to use it to […] More
Hollywood has a clear idea of what it would look like if someone used cyber-capabilities against us: a man in a room full of screens […] More
David Navetta is an attorney who focuses primarily on technology, privacy, information security, and intellectual property law at Norton Rose Fulbright. In an interview with […] More
Does the cyber domain call for a fundamentally different framework for achieving international order in the 21st century, requiring statesmen to critically rethink the art […] More
As President and CEO of FusionX, Matt Devost focuses on cybersecurity and risk management. Devost told The Cipher Brief that offensive cyber operations should rest […] More
“But what is new is that the small fry also have the power of betrayal…Science, adding to our armoury, continually demands more mechanics and more […] More
Search