Skip to content

SIGN UP FOR THE DAILY NEWSLETTER FOR MORE EXPERT ANALYSIS & COMMENTARY

SIGN UP
The Cipher Brief
Monday April 23, 2018
Get Our NEWSLETTER
Menu
  • Briefs
    • Africa
    • Asia
    • Europe
    • Latin America
    • Middle East
    • North America
    • Tech/Cyber
  • Columns
    • Cipher Brief Expert View
    • Economic Tradecraft
    • Fine Print
    • Private Sector
    • Agenda Setter
    • State of Play
    • Strategic View
  • The Dead Drop
  • Our Experts
  • About Us
  • Cyber Advisory Board
  • Sponsorship
  • Podcasts
    • 15 Minutes
    • The Cipher Daily Podcasts
    • In Brief
    • In My Own Words
    • Intelligence Matters
  • Threat Conference
  • Twitter
  • Linkedin
  • Facebook
  • Instagram
  • Briefs
    • Africa
    • Asia
    • Europe
    • Latin America
    • Middle East
    • North America
    • Tech/Cyber
  • Columns
    • Cipher Brief Expert View
    • Economic Tradecraft
    • Fine Print
    • Private Sector
    • Agenda Setter
    • State of Play
    • Strategic View
  • The Dead Drop
  • Our Experts
  • About Us
  • Cyber Advisory Board
  • Sponsorship
  • Podcasts
    • 15 Minutes
    • The Cipher Daily Podcasts
    • In Brief
    • In My Own Words
    • Intelligence Matters
  • Threat Conference
The Network

The Network

Ben Buchanan
BELFER CENTER CYBERSECURITY PROJECT, HARVARD UNIVERSITY

Ben Buchanan is a Postdoctoral Fellow at the Belfer Center Cybersecurity Project, where he conducts research on the intersection of cybersecurity and statecraft. He received his PhD in War Studies from King's College London, where he was a Marshall Scholar, and earned masters and undergraduate degrees from Georgetown University. His first book, “The Cybersecurity Dilemma,” will be published by Oxford University Press and Hurst in early 2017. Previously, he has written on attributing cyber attacks, deterrence in cyber operations, cryptography, election cybersecurity, and the spread of malicious code between nations and non-state actors.

More From Ben Buchanan

Mitigating “The Legend of Sophistication” in Cyber Operations
March 8, 2017July 25, 2017
The drumbeat of cyber incidents continues unabated, with breaches at email providers, insurance companies, defense contactors, telecoms, adult websites, government databases, and so much more. These...
Election Vulnerabilities: The Problem of Perception
November 6, 2016November 6, 2017
When it comes to cybersecurity preparations for the 2016 election, it is now officially too late. The success, perceived and actual, of the election on Tuesday will depend on the efforts officials...
Purchase The Cipher Brief's 2018 Threat Report.

The Cipher Daily Brief

Get a daily rundown of the top security stories delivered to your inbox Monday through Friday with exclusive briefs and columns on what matters most to you and your organization.
SIGN UP FOR The Newsletter
Sign up

Connecting Business and Security

The Cipher Brief © 2015
  • About Us
  • Advertise
  • Careers
  • Contact
  • Get Our Newsletter
  • Privacy Policy