Laying Down a Marker
After much hand-wringing, the U.S. publicly admitted that the Russian government is interfering with the Presidential election. This was an open secret for weeks, but […] More
After much hand-wringing, the U.S. publicly admitted that the Russian government is interfering with the Presidential election. This was an open secret for weeks, but […] More
Most political leaders understand that governments that fail to respond to public provocations by foreign states do so at their own risk. In recent years, […] More
The White House is looking to take a “proportional” response to Russia’s alleged hacking of U.S. political party organizations and effort to interfere in the […] More
October is National Cyber Security Awareness Month and The Cipher Brief is pulling together a Cyber Advisory Task Force made up of public and private […] More
Australia’s armed forces have fought as an ally of the United States in all if its wars since WWII. As an original partner in the […] More
Speaking the Same Language Since the earliest stages, the F-35 was designed to improve the interoperability of coalition nations fighting together. The Cipher Brief spoke […] More
As cyber attacks against U.S. government and private networks have increased in severity in recent years, the Congress and President have actively sought to identify, […] More
A confusing legal landscape and ever changing technology has created a challenging environment for businesses to navigate. The Cipher Brief recently spoke to Chris Pogue, […] More
The past year has proven to be a contentious and disruptive time for the technology sector. The threat of home grown terrorism combined with the […] More
The risk of attack or theft from cyber-enabled actors has been made extremely clear to both private businesses and governments. The last few years have […] More
As more and more business is conducted online and cyber criminals target in on a very lucrative market, both the public and private sector face […] More
Whether it’s your phone, your computer, TV, or even a refrigerator, all those connected devices that we depend on in our daily lives have become […] More
Observers around the world were shocked when news broke about a major bank heist in Bangladesh. This was no ordinary robbery though – this time, […] More
Cyber threats pose a challenge to banks and firms operating in the financial sector, primarily due to the fact that “vulnerability really exists everywhere,” both […] More
The Cipher Brief sat down with Steven Grossman, VP of Strategy and Enablement at Bay Dynamics, to discuss the current cyber threat landscape facing the […] More
The United States and its allies need a three-dimensional strategy for beating back the Islamic State and its allies, one that looks beyond the immediate […] More
Yahoo has announced hackers, believed to be state-sponsored, stole data on around 500 million users in 2014. The Cipher Brief’s Kaitlin Lavinder spoke with Vitali […] More
There are two different types of insider threat: negligent and malicious. Negligent insiders are people who give attackers access by mistake. For example, the employee […] More
Search