Election Security is National Security

by Rob Joyce

Rob Joyce is the Senior Advisor for Cybersecurity Strategy at the National Security Agency.  He was also a key speaker at DEF CON 26, the premiere hacker’s convention held every year in Las...

What CISOs Want

by Robert D. Rodriguez

CEOs, CISOs’ CTO’s and other c-suites are meeting at SINET’s Global Cybersecurity Innovation Summit in London this week. Cipher Brief CEO & Publisher Suzanne Kelly, who is moderating a...

Ruminations on the Most Devastating Cyber Attack in History

by Mark Weatherford

A recent article titled, The Untold Story of NotPetya, The Most Devastating Cyberattack in History came out a few weeks ago and I’ve been ruminating on it ever since.  It bothered me...

NATO's Advancement in Cyber

by Klara Jordan

The 2018 NATO summit and the months leading up to it were a spectacle of diplomacy at its finest and at its worse. The media drama surrounding the summit overshadowed the big strides the Alliance has...

Measuring the Web of Cyber Information Sharing

by Dr. Barbara George

Like the parable of the six blind men trying to learn what an elephant is by only touching one piece of the creature, regulators are assessing the nation’s cybersecurity efforts by looking at...

The Cyber Horror Picture Show: Doing the Time Warp Yet Again

by Thomas Donahue

I remember doing the Time Warp Drinking those moments when The blackness would hit me And the void would be calling Let’s do the Time Warp again Let’s do the Time Warp again Rocky Horror...

Don't Underestimate Economic Side of Russia's Cyber Warfare

by Boris Zilberman

Russia knows how to spread chaos and outrage in American politics, but Russia may pose a far greater threat to the U.S. economy and the infrastructure it depends on. The president’s Council of...

The Argument for Mapping Cyber Response

by Jason Healey

  The Trump administration has a dozen top cybersecurity priorities ranging from a new national cyber strategy to dealing with increasingly bold nation-state adversaries. One priority – that...

Virtualized Networking: A Case for CIOs

by Jill Singer

The massive data breach that occurred at the U.S. Office of Personnel Management (OPM) in 2015 was attributed, in part, to aging technology systems. In fact, legacy technology pervades federal...

Memo to POTUS: Responding to Cyber Attacks and PPD-20

by Jason Healey

Mr. President, as you know the United States has faced cyber attacks of increasing frequency and viciousness from our adversaries. Your NSC is about to bring you both a new cyber strategy and a...