Skip to content
Search

Latest Stories

Cyber Initiatives Group Fall Summit
cipherbrief

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Embracing Breach Notifications

Thanks to breach disclosure regulations in the U.S. and U.K., we regularly learn about the latest capers from the headlines. Without a doubt, these countries still face daunting cyber security challenges. One way to make those challenges look almost manageable is to compare them with the state of cyber awareness in Asia.

Advanced cyber attacks in Asia are relatively common. In the second half of 2015, FireEye observed targeted attacks on 27 percent of its customers in the Asia Pacific region, which is nearly double the global average exposure of 15 percent. Over this period, an organization in Asia was almost twice as likely to be hit with an advanced cyber attack than the worldwide average.

Keep reading...Show less
Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.
Threat Con 2025

Related Articles

Chinese Ghost Machines: The Hidden Risk in Australia's Energy Infrastructure

EXPERT PERSPECTIVE — The recent revelations from Reuters and other U.S. news outlets, detailing the discovery of "rogue" communication devices [...] More

Dealing with 'Axis of Authoritarians' Requires Greater U.S. Policy Risk

BOTTOM LINE UP FRONT — Individually, China, Russia, Iran and North Korea consistently rank high on the U.S. list of global threats but national and [...] More

Dear Presidential Candidates: North Korea is Part of Putin's Strategy

OPINION — The mutual defense pact that Russian President Vladimir Putin and North Korean Chairman Kim Jong Un signed on June 19, was a victory for [...] More

A Dark Path Ahead for North Korea

OPINION — As Russian President Vladimir Putin visits North Korea, it’s important to keep in mind the weapons including artillery shells and ballistic [...] More

America's Food Supply Has a Cyber Problem

OPINION — Fine-tuned sensors let farmers know which fields need more water and which crops need more fertilizer. But today, a hacker halfway around [...] More

Hackers are Taking Advantage of Gaps in U.S. Cybersecurity Policy

OPINION — When you press the power button on your computer, it turns on because a specialized code called firmware turns this stimulus into a signal [...] More