Plan for Cyber Breaches, Then Practice, Practice, Practice
Every organization should have a plan to protect its critical information from the actions of a disgruntled employee, or from a criminal hacker looking to […] More
Every organization should have a plan to protect its critical information from the actions of a disgruntled employee, or from a criminal hacker looking to […] More
The range of ferocious offensive cyber attacks by revisionist and rogue powers in recent years makes clear that the U.S. and its allies are fully […] More
When we think of arms races, we are naturally drawn to the physical: missiles, satellites, fighter jets, submarines and aircraft carriers. While those assets are […] More
The world is just beginning to experience the disruptions being generated by blockchain, the technology that underpins Bitcoin and that provides a new way to […] More
We may be frustrated by the state of cybersecurity today, with the attackers getting better and more audacious year after year, but defenders would be […] More
The launch of Bitcoin futures trading is a good moment to consider the cyber and wider security issues raised by this and other cryptography-based currencies. It is […] More
Russian President Vladimir Putin has sought to exploit open and free U.S. cyberspace, which serves as a force multiplier for commerce and freedom of expression, […] More
It was almost a devastatingly effective cyber-heist. Hackers compromised the Kathmandu-based NIC Asia Bank this fall, fraudulently transferring $4.4 million to destinations in at least […] More
The Trump Administration’s National Security Council has released an unclassified set of guidelines for determining when the U.S. government will disclose – rather than retain […] More
Software is the invisible underpinning for much of our digital world. At its core is source code: the lingua franca that allows software-based technology systems […] More
The NSA surveillance programs under the authorities laid out in the Foreign Intelligence and Surveillance Act (FISA) Section 702 have been making headlines since former […] More
Earlier this month, two members of the House of Representatives Tom Graves (R-GA) and Kyrsten Sinema (D-AZ) introduced a bill called Active Cyber Defense Certainty […] More
As I have previously written, U.S. Cyber Command has grown up, and its elevation to a unified combatant command will soon be complete. The focus […] More
Russian state-sponsored hackers were able to steal National Security Agency material on methods they use to conduct cyber espionage as well as how they help […] More
The Cipher Brief Cyber Advisory Board convenes meetings with some of the most innovative thinkers across government and the private sector, tackling a range of […] More
By now, you’ve probably heard the news that the U.S. State Department is losing its top diplomat on issues relating to cybersecurity, Chris Painter. In […] More
One of the only tasks the U.S. Constitution declares that the federal government must do is to provide for the common defense. That is the […] More
The newest ransomware attack called NotPetya has re-ignited the debate ongoing since the earlier WannaCry attack. Cybersecurity experts, policymakers, and citizens affected have all asked: who is to blame for […] More
Search