The Argument for Mapping Cyber Response
The Trump administration has a dozen top cybersecurity priorities ranging from a new national cyber strategy to dealing with increasingly bold nation-state adversaries. One […] More
The Trump administration has a dozen top cybersecurity priorities ranging from a new national cyber strategy to dealing with increasingly bold nation-state adversaries. One […] More
As the world focuses on the Singapore summit between President Donald Trump and North Korean leader Kim Jong Un, the President’s Treasury Secretary announced sanctions […] More
The massive data breach that occurred at the U.S. Office of Personnel Management (OPM) in 2015 was attributed, in part, to aging technology systems. In […] More
During the Cold War era, there was an adage that arms controllers hated but proved prophetic, “When relations are bad, you don’t want arms […] More
Bottom Line: The risk posed to U.S. national security by what are believed to be Russian-backed hacking groups, is similar to the October 1962 Cuban […] More
With the last few years of progress in artificial intelligence, it is hard to look forward without excitement…and apprehension. If you are paying attention at […] More
The Cipher Brief hosted its second annual threat conference at beautiful Cloister Resort on Sea Island, Ga., this month. While there, Dmitri Alperovitch and I […] More
When accountability is used as innovation, it not only drives social change but also helps solve seemingly intractable problems. Cybersecurity is an industry that can […] More
It is not news that cyberspace is insecure. Attackers have had the advantage over defenders for not just years, but decades. Quotes from decades ago […] More
The Trump administration has accused Russia of a coordinated “multi-stage intrusion campaign” to hack into critical U.S. infrastructure networks and conduct “network reconnaissance” while attempting […] More
Cyber events of the past two years—perpetrated by state actors in several notable cases, according to public statements by the U.S. and British governments— have […] More
Everyone loves public-private sector partnerships (PPPs). For over 20 years, these initiatives have been critical to a range of cybersecurity solutions. Perhaps 85 percent of […] More
Bottom Line: A spy’s tradecraft must constantly evolve because of the rapid changes of the digital age – especially the tools and skills required to […] More
In Washington, there may be division and confusion about how to deal with Russian cyber-based interference. But 25 miles north, at Fort Meade, home of […] More
Bottom Line: Russia’s use of private military contractors in Syria lends the Kremlin deniability that becomes problematic when the U.S. tries to calculate how to […] More
Every organization should have a plan to protect its critical information from the actions of a disgruntled employee, or from a criminal hacker looking to […] More
Bottom Line: While North Korea has put on a friendly face during the Olympic Games taking place along its southern border, the country’s hackers continue […] More
Cipher Brief Cyber Advisory Board members offer their views on threats to the U.S. power grid, as interviewed by Cipher Brief Publisher and CEO Suzanne […] More
Search