Cutting Cyber Command’s Umbilical Cord to the NSA
Despite the many logistical and operational challenges of a transition, many acknowledge that U.S. Cyber Command must eventually separate from the National Security Agency. According […] More
Despite the many logistical and operational challenges of a transition, many acknowledge that U.S. Cyber Command must eventually separate from the National Security Agency. According […] More
Reports of intrusions into industrial control systems (ICS) broke late last week – this time in several U.S. power plants, including the Wolf Creek nuclear […] More
Relations between the United States and North Korea hit a new low following Pyongyang’s test of an ICBM July 4. With a range of up […] More
In May, the U.S. Ground-based Midcourse Defense system – the GMD – successfully intercepted a mock ICBM in a critical test of the U.S. missile […] More
The Pentagon’s missile defense review is now underway, incorporating mandates from both the White House and Congress. One of its considerations, at presidential direction, is […] More
As the dust settles on last Tuesday’s NotPetya malware outbreak, it is increasingly evident that this was not a ransomware, money-making attack at all; rather […] More
In the early days of the internet, criminals quickly saw the new technology as an avenue for data theft, extortion, and uninhibited global reach. These […] More
Intelligence Advanced Research Projects Activity Director Jason Matheny worries a lot about national security risks that probably aren’t headlining many lists of pressing threats to […] More
It’s Labor Day, September 4, 2017, and the National Security Agency has just intercepted communications between the senior leadership of the Iranian Revolutionary Guard Corps, […] More
With the advent of digital communications, people thousands of miles apart can engage with each other seamlessly, and businesses can operate at a scale previously […] More
Terrorism, political corruption, and human rights violations in sub-Saharan Africa are like any other business: management identifies and provides a needed product or service to […] More
Last February, President Donald Trump issued an Executive Order calling on the Department of Treasury to review the 2010 Dodd-Frank Wall Street Reform and Consumer Protection Act […] More
Malicious and trusted insiders pose a range of challenges in terms of counterintelligence risks and physical threats, and experts say policy needs to catch up […] More
The explosion of data in a digital world has exposed people to volumes of information as never before. But just as this data will increase […] More
National Geospatial-Intelligence Agency Deputy Director Susan Gordon on Wednesday called for the government and Intelligence Community to prioritize innovation to better confront the broad array […] More
Few security challenges muddle the distinction between government and business roles as those emanating from cyberspace. National security issues no longer remain solely under the […] More
Statecraft and business have always been closely linked, but the advent of digital technology has blurred the roles more than ever. Systems crucial to the […] More
The United Kingdom has revamped the way its intelligence agencies collaborate with private industry by establishing a new National Cyber Security Centre that leans towards […] More
Search