How Cyber-Jihadists Protect Their Identities and Their Posts

by Laith Alkhouri

ISIS has become infamous for using the Internet to radicalize and recruit individuals worldwide. Lesser known, however, are the tech-savvy ISIS supporters who dedicate their time and resources not...

Deploying Cyber to the Front Lines of Battle

by Bill Leigher

The separation of the U.S. Cyber Command and the National Security Agency (NSA) would have two major and immediate effects. It would allow the Cyber Command to develop tools built specifically for...

Don’t Be Fooled by Blame Game: WannaCry Shows Gross Unpreparedness

by Doug Shepherd

Despite the insistence of many pundits and technical experts, the recent WannaCry outbreak was – mercifully – a poorly organized attack with a poorly constructed tool. It was, in fact, the best...

Why Smart Crooks are Snapping Up Ransomware

by Steve Grobman

Cybercrime is market-driven, with criminals gravitating toward models that maximize their return on investment. Criminals will divest and lessen efforts that have lower returns in favor of campaigns...

Camouflaged Aggression: A Strategic Shift in Russia’s Cyber Activity

by Sarah Geary

Russian cyber operations are widely discussed and reported on today. Conversations frequently range from how the Russian government hacked the Democratic National Committee (DNC) to the utilization...

Mitigating “The Legend of Sophistication” in Cyber Operations

by Ben Buchanan

The drumbeat of cyber incidents continues unabated, with breaches at email providers, insurance companies, defense contactors, telecoms, adult websites, government databases, and so much more. These...

Mitigating Harm from a Breach of Internet-Connected Devices

by Colin McKinty

The Internet of Things (IoT), a phenomenon of everyday Internet-connected devices ranging from smart appliances to webcams and routers, is making the lives of companies, governments, and households...

Cybersecurity: The Difficulty of Staying One Step Ahead of the Bad Guys

by Tammy Moskites

The cybersecurity environment is constantly changing. The Cipher Brief spoke with Tammy Moskites,  Chief Information Officer at the cybersecurity firm Venafi, who says cybersecurity professionals...

Company Systems Vulnerable to Mobile Devices

by Michael Covington

With the pervasive growth of smart phone and tablet use, cybersecurity professionals are worried these devices could present new vulnerabilities to company systems. The Cipher Brief spoke with...

Offensive Security Has Value

by Guy Bejerano

With organizations and companies continuing to experience breaches in their networks, there is a need for the cybersecurity industry to quickly adapt their strategies so that they are inspecting the...