DHS’ Big Plan for a Stronger Public-Private Cyber Partnership
When DHS was established shortly after 9/11, terrorism was the focus. But in the 16 years since the Agency’s creation, the threat landscape has changed […] More
When DHS was established shortly after 9/11, terrorism was the focus. But in the 16 years since the Agency’s creation, the threat landscape has changed […] More
Bottom Line: The dark web has long been a place where stolen personal data is bought and sold in staggering numbers, criminals run lucrative drug […] More
Cipher Brief Expert and former Senior Director for Cyber Operations at the National Security Council, Thomas Donahue, provides critical perspective on the strategy needed to […] More
(Ed note: Follow co-author Dr. Catherine Lotrionte’s sessions at RSA this week: Nation States Behaving Badly: The Evolving Rules of the Game in Cyberspace March […] More
Last week, The Cipher Brief told you how and why the U.S. has been working to convince its allies to ban Chinese vendors from contributing […] More
Fresh off the heels of the Munich security conference, a rift remains between the U.S. and its allies over their approach to 5G networks and […] More
Bottom Line: In the digital age, determining the origins of cyberattacks is already difficult, but cyber actors can further muddy attribution by diverting blame for […] More
Innovation in Government isn’t generally a phrase that rolls off the tongue, but in a relatively unconstrained threat environment, innovation has become synonymous with survival. […] More
Bottom Line Up Front: The Trump Administration is confronting China on issues that have been developing for years and have percolated to the top of […] More
Bottom Line: The U.S. and its NATO allies have warned that Russian submarine activity near undersea fiber optic cables means Moscow may be plotting to […] More
At a recent private D.C. dinner, Homeland Security Secretary Kirstjen Nielsen gathered with academics and cyber experts from the private sector to talk candidly about […] More
According to a recent report by the National Defense Strategy Commission (NDS), the U.S. Department of Defense and the White House “have not yet articulated […] More
Bottom line: Terrorists are turning to the dark web’s crypto-bazaars, social media channels and e-commerce sites to buy more coveted military equipment than the usual […] More
This brief is part of The Cipher Brief’s 2018 Annual Threat Report. Bottom Line: There are three prominent technological security concerns for the United States […] More
China’s state news agency Xinhua, has shown the world just how far China has come in the artificial intelligence race with the introduction of a […] More
As tensions heat up between Russia and the West, cold-war skills are back in play. Norway and Iceland are hosting more than 50,000 troops from […] More
Twitter is releasing a trove of known accounts and posts that it says were used to meddle in U.S. elections dating back to 2016. According […] More
As the Principal Deputy Director of National Intelligence, Susan M. Gordon serves as DNI Dan Coats’ number two, helping to manage an Intelligence Community (IC) […] More
Search