CTIIC’s Role in Keeping America Safe in Cyber

by Suzanne Kelly

One day last May, employees of Britain’s health service logged on to their computers to find a startling discovery: their data had been encrypted, rendering it inaccessible until and unless they...

The Attacker Has the Advantage in Cyberspace. Can We Fix That?

by Jason Healey

It is not news that cyberspace is insecure. Attackers have had the advantage over defenders for not just years, but decades. Quotes from decades ago make it clear that cyber defenders then faced the...

The 'Greek Tragedy' of Cyber Security: We Know How This Ends

by Thomas Donahue

Cyber events of the past two years—perpetrated by state actors in several notable cases, according to public statements by the U.S. and British governments— have demonstrated the potential for...

Who’s In Control? Balance and Power of Cyber Partnership

by Jason Healey

Everyone loves public-private sector partnerships (PPPs). For over 20 years, these initiatives have been critical to a range of cybersecurity solutions. Perhaps 85 percent of the critical...

Sanctions for NotPetya? You Betcha.

by Bob Gourley

The White House deployed words to chide Russia for the NotPetya attack. On 15 February 2018, the White House Press Secretary released a blunt statement: In June 2017, the Russian military launched...

US Cyber Command: "When faced with a bully...hit him harder."

by Jason Healey

In Washington, there may be division and confusion about how to deal with Russian cyber-based interference. But 25 miles north, at Fort Meade, home of U.S. Cyber Command, they are angry and...

Plan for Cyber Breaches, Then Practice, Practice, Practice

by Rick Ledgett

Every organization should have a plan to protect its critical information from the actions of a disgruntled employee, or from a criminal hacker looking to make money, or from a nation state actor –...

Stopping the Next Cyber Conflict

by Dmitri Alperovitch

The range of ferocious offensive cyber attacks by revisionist and rogue powers in recent years makes clear that the U.S. and its allies are fully enmeshed in the third generation of cyber...

Spy, Robot: China and U.S. Locked in AI Arms Race

by Bob Griffin

When we think of arms races, we are naturally drawn to the physical: missiles, satellites, fighter jets, submarines and aircraft carriers. While those assets are important for conventional warfare,...

Need to Know: Sidestepping False Profits in Blockchain

by Bob Gourley

The world is just beginning to experience the disruptions being generated by blockchain, the technology that underpins Bitcoin and that provides a new way to fight fraud and improve cybersecurity....