The New Dynamic Cyber Threat Environment
An attempted cyberattack on Israel’s water system in late April, just months after the global pandemic hit, prompted fears that cyber adversaries are getting even […] More
An attempted cyberattack on Israel’s water system in late April, just months after the global pandemic hit, prompted fears that cyber adversaries are getting even […] More
We know that corporate boards can no longer afford to leave cyber to the IT team. In the future, (which is now) they need to […] More
Sean Roche is former Associate Deputy Director of CIA for Digital Innovation. The Directorate of Digital Innovation (DDI) was created to accelerate the integration of advanced […] More
Sean Roche is former Associate Deputy Director of CIA for Digital Innovation. The Directorate of Digital Innovation (DDI) was created to accelerate the integration of advanced […] More
Quantum Information Science has been around for a while, but the importance of quantum computing and its impact on national security has become clear in […] More
Thomas Donahue is a Cipher Brief expert and former Senior Director for Cyber Operations on the U.S. National Security Council Staff. His article was originally published […] More
Thomas Donahue is a Cipher Brief expert and former Senior Director for Cyber Operations on the U.S. National Security Council Staff. His article was originally […] More
The development of artificial intelligence (AI) technologies provides great potential to businesses that are able to harness the opportunities it presents, but AI also poses […] More
The Cipher Brief is running a special series on disinformation over the next several months. We’ll introduce you to experts in the field who will […] More
Predicting the future of Cloud computing is a bit like predicting the weather: there are certain knowns that you can set a clock by, but […] More
When DHS was established shortly after 9/11, terrorism was the focus. But in the 16 years since the Agency’s creation, the threat landscape has changed […] More
Bottom Line: The dark web has long been a place where stolen personal data is bought and sold in staggering numbers, criminals run lucrative drug […] More
Last week, The Cipher Brief told you how and why the U.S. has been working to convince its allies to ban Chinese vendors from contributing […] More
Fresh off the heels of the Munich security conference, a rift remains between the U.S. and its allies over their approach to 5G networks and […] More
Bottom Line: In the digital age, determining the origins of cyberattacks is already difficult, but cyber actors can further muddy attribution by diverting blame for […] More
Innovation in Government isn’t generally a phrase that rolls off the tongue, but in a relatively unconstrained threat environment, innovation has become synonymous with survival. […] More
Bottom Line Up Front: The Trump Administration is confronting China on issues that have been developing for years and have percolated to the top of […] More
Bottom Line: The U.S. and its NATO allies have warned that Russian submarine activity near undersea fiber optic cables means Moscow may be plotting to […] More
Search