Tech/Cyber

The Next Concorde

Periodically, The Cipher Brief will explore outside-the-box technologies and unusual, sometimes weird, scientific innovations. You’ll see how the boundaries between reality and fantasy are growing thinner […] More

The New Battlefield

It helps in thinking about the future of cyber war if we break it into two parts: the future of cyber and the future of […] More

Strengthening U.S. Cyber Defenses

The Office of Personnel Management (OPM) hack shocked the U.S., exposing the vulnerability of the U.S. government to cyber attack.  After thieves took the personal […] More

New Ground Rules Needed

Imagine this:  a private company discovers that detailed personal identifying information—including Social Security numbers, dates of birth, passport data, foreign travel histories, and other sensitive […] More

Black Hat 2015: The Cipher Brief’s Top Picks

It’s Day 3 of Black Hat 2015, a major conference for cybersecurity professionals.  With over 9,000 attendees expected, the conference addresses major issues facing top information security […] More

Leveraging Social Media

Social media offers valuable information that can improve day-to-day operations and strategic planning for businesses and governments.  The ease of accessing social media, however, belies […] More

Search

Close