
Ransomware Requires More than Piecemeal Federal Mandates
PRIVATE SECTOR EXPERT VIEW — Over the last eight years, the volume of successful ransomware attacks has reached pandemic levels. The U.S. Cyber Executive Order […] More
PRIVATE SECTOR EXPERT VIEW — Over the last eight years, the volume of successful ransomware attacks has reached pandemic levels. The U.S. Cyber Executive Order […] More
OPINION — If cyber threats had a most wanted list, ransomware would be well within the top five, and headlines from the past few years […] More
If the right to reasonable privacy is a nonnegotiable, weight-bearing pillar of democracy and omniscient surveillance is the hallmark of authoritarianism….is there an in between? […] More
Jen Easterly is Head of Firm Resilience and the Fusion Resilience Center at Morgan Stanley. She is also the Biden Administration’s nominee to become the […] More
Hitesh Sheth is the president and CEO of Vectra. Previously, he was chief operating officer at Aruba Networks and before that, he was EVP/GM at […] More
Akash “Aki” Jain is President of Palantir USG, Inc. where he focuses on Artificial Intelligence, USG Technical Engagement, Enterprise Data Management and Cloud Architecture. Private […] More
The Cipher Brief’s Private Sector column focuses on national security thought leadership in the private sector. Andrew Razumovsky is Principal of CANDA Solutions, providing Risk […] More
Every morning, analysts, operators, and policymakers arrive at their desks to read the latest news and intelligence reporting that has come in during the past […] More
Blackwater Founder Erik Prince is making a renewed public push to privatize the U.S. war in Afghanistan. The current CEO and Founder of Frontier Services […] More
ISIS has become infamous for using the Internet to radicalize and recruit individuals worldwide. Lesser known, however, are the tech-savvy ISIS supporters who dedicate their […] More
The separation of the U.S. Cyber Command and the National Security Agency (NSA) would have two major and immediate effects. It would allow the Cyber […] More
Despite the insistence of many pundits and technical experts, the recent WannaCry outbreak was – mercifully – a poorly organized attack with a poorly constructed tool. […] More
Cybercrime is market-driven, with criminals gravitating toward models that maximize their return on investment. Criminals will divest and lessen efforts that have lower returns in […] More
Russian cyber operations are widely discussed and reported on today. Conversations frequently range from how the Russian government hacked the Democratic National Committee (DNC) to […] More
The drumbeat of cyber incidents continues unabated, with breaches at email providers, insurance companies, defense contactors, telecoms, adult websites, government databases, and so much more. […] More
The Internet of Things (IoT), a phenomenon of everyday Internet-connected devices ranging from smart appliances to webcams and routers, is making the lives of companies, […] More
The cybersecurity environment is constantly changing. The Cipher Brief spoke with Tammy Moskites, Chief Information Officer at the cybersecurity firm Venafi, who says cybersecurity professionals […] More
With the pervasive growth of smart phone and tablet use, cybersecurity professionals are worried these devices could present new vulnerabilities to company systems. The Cipher […] More
With organizations and companies continuing to experience breaches in their networks, there is a need for the cybersecurity industry to quickly adapt their strategies so […] More
Search