5 Key Things About 5G
Last week, The Cipher Brief told you how and why the U.S. has been working to convince its allies to ban Chinese vendors from contributing […] More
Last week, The Cipher Brief told you how and why the U.S. has been working to convince its allies to ban Chinese vendors from contributing […] More
Fresh off the heels of the Munich security conference, a rift remains between the U.S. and its allies over their approach to 5G networks and […] More
Bottom Line: In the digital age, determining the origins of cyberattacks is already difficult, but cyber actors can further muddy attribution by diverting blame for […] More
Innovation in Government isn’t generally a phrase that rolls off the tongue, but in a relatively unconstrained threat environment, innovation has become synonymous with survival. […] More
Bottom Line Up Front: The Trump Administration is confronting China on issues that have been developing for years and have percolated to the top of […] More
Bottom Line: The U.S. and its NATO allies have warned that Russian submarine activity near undersea fiber optic cables means Moscow may be plotting to […] More
At a recent private D.C. dinner, Homeland Security Secretary Kirstjen Nielsen gathered with academics and cyber experts from the private sector to talk candidly about […] More
Bottom line: Terrorists are turning to the dark web’s crypto-bazaars, social media channels and e-commerce sites to buy more coveted military equipment than the usual […] More
This brief is part of The Cipher Brief’s 2018 Annual Threat Report. Bottom Line: There are three prominent technological security concerns for the United States […] More
China’s state news agency Xinhua, has shown the world just how far China has come in the artificial intelligence race with the introduction of a […] More
Twitter is releasing a trove of known accounts and posts that it says were used to meddle in U.S. elections dating back to 2016. According […] More
As the Principal Deputy Director of National Intelligence, Susan M. Gordon serves as DNI Dan Coats’ number two, helping to manage an Intelligence Community (IC) […] More
The U.S. Administration released its new National Cyber Strategy on Thursday, covering a broad number of security-related issues that fall into four main categories, it […] More
The world’s malicious cyber actors — Russia, China, Iran, and North Korea – have spoiled cyber’s original, idealistic vision and instead use cyberspace to advance […] More
Bottom Line: In the past decade, Iran’s cyber capabilities have evolved from a tool used to lash out against domestic opponents of the Islamic Republic […] More
Few would argue that in a world of consistent, emerging cyber threats, the role of the Chief Information Security Officer is one that requires a […] More
On the heels of the Helsinki summit between U.S. President Donald Trump and Russian President Vladimir Putin, it bears revisiting some of the important, outstanding […] More
In part two of The Cipher Brief’s two-part series on how Russia is building its virtual battlefield, we look at the U.S response to the […] More
Search