Skip to content
Search

Latest Stories

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Private Sector

Collective Defense Really Can Thwart Ransomware Attacks

OPINION — If cyber threats had a most wanted list, ransomware would be well within the top five, and headlines from the past few years cements this [...] More

The Latest

Ransomware Requires More than Piecemeal Federal Mandates

PRIVATE SECTOR EXPERT VIEW — Over the last eight years, the volume of successful ransomware attacks has reached pandemic levels. The U.S. Cyber [...] More

Forget the AI Race. Let's Invest in a Data Grid for AI.

Akash "Aki" Jain is President of Palantir USG, Inc. where he focuses on Artificial Intelligence, USG Technical Engagement, Enterprise Data Management [...] More

The Future of Integrated Risk Management

The Cipher Brief's Private Sector column focuses on national security thought leadership in the private sector. Andrew Razumovsky is Principal of [...] More

How Emerging AI Technologies Can Help Us Think 'Smarter'

Every morning, analysts, operators, and policymakers arrive at their desks to read the latest news and intelligence reporting that has come in during [...] More

The Push to Privatize the Afghan War

Blackwater Founder Erik Prince is making a renewed public push to privatize the U.S. war in Afghanistan. The current CEO and Founder of Frontier [...] More

How Cyber-Jihadists Protect Their Identities and Their Posts

ISIS has become infamous for using the Internet to radicalize and recruit individuals worldwide. Lesser known, however, are the tech-savvy ISIS [...] More

Deploying Cyber to the Front Lines of Battle

The separation of the U.S. Cyber Command and the National Security Agency (NSA) would have two major and immediate effects. It would allow the Cyber [...] More

Don’t Be Fooled by Blame Game: WannaCry Shows Gross Unpreparedness

Despite the insistence of many pundits and technical experts, the recent WannaCry outbreak was – mercifully – a poorly organized attack with a poorly [...] More

Why Smart Crooks are Snapping Up Ransomware

Cybercrime is market-driven, with criminals gravitating toward models that maximize their return on investment. Criminals will divest and lessen [...] More

Camouflaged Aggression: A Strategic Shift in Russia’s Cyber Activity

Russian cyber operations are widely discussed and reported on today. Conversations frequently range from how the Russian government hacked the [...] More

Mitigating “The Legend of Sophistication” in Cyber Operations

The drumbeat of cyber incidents continues unabated, with breaches at email providers, insurance companies, defense contactors, telecoms, adult [...] More

Mitigating Harm from a Breach of Internet-Connected Devices

The Internet of Things (IoT), a phenomenon of everyday Internet-connected devices ranging from smart appliances to webcams and routers, is making the [...] More