The Next Concorde
Periodically, The Cipher Brief will explore outside-the-box technologies and unusual, sometimes weird, scientific innovations. You’ll see how the boundaries between reality and fantasy are growing thinner […] More
Periodically, The Cipher Brief will explore outside-the-box technologies and unusual, sometimes weird, scientific innovations. You’ll see how the boundaries between reality and fantasy are growing thinner […] More
It helps in thinking about the future of cyber war if we break it into two parts: the future of cyber and the future of […] More
The Cipher Brief spoke with Dr. Paulo Shakarian, the author of Introduction to Cyber-Warfare, about the future of cyber war. Dr. Shakarain runs Arizona State […] More
The Cipher Brief spoke with Rob Knake, the former Director for Cyber Security Policy at the National Security Council (2011-2015), about the future of cyber […] More
The Cipher spoke with Frank Cilluffo, who runs George Washington University’s Center for Cyber and Homeland Security, to discuss the U.S. government’s cyber security posture. […] More
It’s a cliché that we live in a world of exponential change. Having spent 32 years at the CIA, from 1978 until 2010, I thought […] More
It’s a cliché that we live in a world of exponential change. Having spent 32 years at the CIA, from 1978 until 2010, I thought […] More
A quick lesson for business leaders (and the millions of others who communicate by e-mail): The digital world as we now know it is forever. […] More
Social media can be a valuable resource for companies, especially those with dispersed operations, by providing situational awareness, work force and facility protection, and advanced […] More
The U.S. depends heavily on military and commercial satellites. If a less satellite-dependent opponent launched an anti-satellite (ASAT) attack, it would have far greater impact […] More
The Office of Personnel Management (OPM) hack shocked the U.S., exposing the vulnerability of the U.S. government to cyber attack. After thieves took the personal […] More
Jimmie Breslin borrowed a line from manager Casey Stengel to title his chronicle of the worst team in baseball history, the 1962 Mets. Stengel plaintively […] More
Imagine this: a private company discovers that detailed personal identifying information—including Social Security numbers, dates of birth, passport data, foreign travel histories, and other sensitive […] More
By now you’ve probably heard about the two cybersecurity professionals who hacked a Jeep while it was in motion. Earlier this month, hackers at Def Con, a […] More
The Cipher Brief sat down with Michael Chertoff at the Aspen Security Conference to discuss emerging issues in cybersecurity. He feels that businesses and the […] More
It’s Day 3 of Black Hat 2015, a major conference for cybersecurity professionals. With over 9,000 attendees expected, the conference addresses major issues facing top information security […] More
Social media offers valuable information that can improve day-to-day operations and strategic planning for businesses and governments. The ease of accessing social media, however, belies […] More
Cybercriminals are now using more advanced methods, once the exclusive domain of the state, to steal and profit from personal and proprietary information, blurring the […] More
Search