Can You Ask a Spy Not to Spy? TCB's Cyber Advisory Board Debates
Zero-day vulnerabilities — security flaws in commercial software or hardware for which developers haven’t devised a patch — have existed since the dawn of the […] More
Zero-day vulnerabilities — security flaws in commercial software or hardware for which developers haven’t devised a patch — have existed since the dawn of the […] More
The problem of stolen credentials is a well-known threat in the security industry. But knowing something is a problem and understanding the full scope are […] More
With the seemingly constant barrage of leaks revealing the U.S. intelligence community’s hacking capabilities, many are wondering where government draws the line between priorities of […] More
Wikileaks’ “Vault7” disclosure last month of apparent CIA hacking tools marked the third recent incident in which an inadvertent public release of alleged government hacking […] More
China continues to deploy military equipment to contested islands in the South China Sea, raising concerns among regional players and U.S. forces stationed in the […] More
In September 2015, Chinese President Xi Jinping and President Barack Obama reached an agreement that neither nation would “conduct or knowingly support cyber-enabled theft of […] More
China is a burgeoning great power. It is continually figuring out the various dimensions of power – not least of which is power in cyberspace […] More
Connectivity continues to enmesh businesses, governments, societies and people – a trend that will only accelerate with the growth of public cloud services and devices […] More
In the world of network security, the term air gap refers to a situation in which the computer network is physically separated from other networks, […] More
An air gap – meaning, a computer without direct network access of any kind – seems like the perfect solution to the gossamer threads of […] More
FBI Director James Comey confirmed on Monday, for the first time, that the agency is conducting an investigation into whether there was any coordination between […] More
European countries are becoming increasingly wary of foreign disinformation and subversion operations in their own internal politics following Russian interference in last year’s U.S. elections. […] More
Where will Russian President Vladimir Putin strike next? With the 2018 Russian election around the corner, former Soviet states are nervous. Foreign adventures are the […] More
Russian offensive cyber capabilities are as sophisticated as those of other major cyber powers, such as the United States and China, and they likely exceed […] More
In 2013, former President Barack Obama was close to ending the “dual-hat” leadership of both the National Security Agency and U.S. Cyber Command, only to […] More
There as been discussion of a separation between the National Security Agency and U.S. Cyber Command for a while, only for the change in administrations […] More
WikiLeaks on Tuesday published what it claims to be the CIA’s hacking techniques to exploit devices such as smart phones, computers, and Internet-connected televisions for […] More
As an economic power and pivotal regional player in Asia, India is home to the second-highest number of internet users of any country in the […] More
Search