EXPERT PERSPECTIVE — Albania, a NATO member state, cut diplomatic ties with Iran earlier this month after blaming Tehran for a cyberattack against [...] More
Latest Stories

Welcome! Log in to stay connected and make the most of your experience.
Your membership has expired. Renew now to continue enjoying exclusive benefits and uninterrupted access.
Couldn’t find an account with that email address, please sign up.
Popular
Companies Need to ‘Think Twice’ Before Retaliating Against Hackers
Exposing Russian Interference - The Value of Real-Time Forensics
Mitigating Cyber Risk at Home
Cipher Brief Expert Daniel N. Hoffman is a retired clandestine services officer and former Chief of Station with the Central Intelligence Agency. His combined 30 years of government service included high-level overseas and domestic positions at the CIA. Hoff man is an advisor to Vaillance Group.
Shawnee Delaney was a clandestine officer and former Detachment Chief for the Defense Intelligence Agency and IT Specialist for the Department of Homeland Security for 10 years. She is a subject matter expert on insider threat and is the CEO of Vaillance Group.
OPINION — If there is one thing we have learned from doing business during the COVID-19 pandemic, it is the great benefits but also associated risks, of relying on cyberspace. A force multiplier for free expression and commerce, cyberspace is also an unregulated playing field subjected to exploitation from adversaries like China, Russia, Iran, and North Korea as well as criminals and terrorists.
Now more than ever, organizations are recognizing that no matter what technical controls and policies they have in place, it is the human threat (both internal and external) that is their greatest vulnerability. While use of the internet enables companies to get work done, it also leaves them and their employees vulnerable to exploitation.
The shift from working in an office, with security measures long in place, to a home environment has highlighted a new set of security risks to businesses including the use of personal unprotected devices, a general lack of cyber hygiene, and an ignorance of the vulnerabilities employees pose to their companies.
When we served in the U.S. Intelligence Community, being in the incident response phase - or “to the right of boom” – of a counterterrorism operation meant we had not collected enough of the disparate intelligence or perhaps did not analyze it properly in order to prevent an attack. In most cases, terrorists, like hackers, conduct reconnaissance before mounting an attack. Failing to detect enemy reconnaissance and learn about the threat, allows the attacker to enjoy the element of surprise.
For this reason, cyber savvy companies should focus on prevention during the pre-attack phase. But the first thing they should do is assume they will be (or already have been) successfully hacked and prepare accordingly. This also applies to the human threat - or insider threat.
Join The Cipher Brief March 23-25 for a three-day Virtual Cybersecurity Summit co-hosted by Cipher Brief CEO & Publisher Suzanne Kelly and former NSA Deputy Director Rick Ledgett, featuring Microsoft President Brad Smith, FireEye CEO Kevin Mandia, General David Petraeus, former PDDNI Susan Gordon, Silverado Policy Accelerator's Dmitri Alperovitch and a host of other public and private sector experts. Attendance is free and registration is required. Sign up today.
The Latest
How Can the U.S. Rebuild After Shocking Series of Cyber Breaches
President-Elect Joe Biden’s incoming national security adviser Jake Sullivan told NPR this week that the Defense Department hasn't granted a meeting [...] More
The Russians Have Issued a Wake Up Call
Weeks after a massive cyber breach of U.S. government agencies and private sector companies was publicly announced, there is still not a clear [...] More
Lessons I Learned as the Head of Israel's National CERT
Lavy Shtokhamer is the former head of Israel's National CERT and Executive Director at the Israel National Cyber Directorate. He previously founded [...] More
Reimagining our Domestic Cyber Defense Posture
OPINION — The SolarWinds breach, targeting several government agencies and private sector entities, was a stunning feat carried out by a nation-state [...] More
A Consequential Attack on America
As Washington continues to investigate the true depth of what experts are describing as one of the most damaging cyberattacks in U.S. history, both [...] More
A Huge Win for Stronger Public-Private Cybersecurity
Patrick D. Gaul is the Executive Director of the National Technology Security Coalition (NTSC), a non-profit, non-partisan, industry-agnostic [...] More
For general inquiries please email info@thecipherbrief.com