Autonomous Bots: It’s All About Scale
Many view cybersecurity as passively blocking attempts to breach networks, but security experts have long advocated more active measures in defense of sensitive networks. Advances […] More
Many view cybersecurity as passively blocking attempts to breach networks, but security experts have long advocated more active measures in defense of sensitive networks. Advances […] More
With cybercrime expected to reach costs nearing $2 trillion by 2019, firms are urgently seeking ways to better defend their networks from the harmful impacts […] More
It is not clear whether a group of Russians arrested on charges of treason for helping U.S. intelligence, involve CIA assets, despite a claim to […] More
Cybersecurity is often discussed in relation to the major global powers: China’s economic espionage, Russian influence operations, and U.S. dragnet global surveillance to thwart terrorism. […] More
Recent years have witnessed a series of increasingly audacious and unprecedented cyber attacks, leading up to the recent accusations of Russian hacking throughout last year’s […] More
Cyber is emerging as Iran’s weapon of choice for dealing with both domestic and foreign opponents. For more than a decade, the Islamic Republic has […] More
The cultural shift stemming from a “need-to-know” to a “need-to-share” atmosphere in the intelligence community in the wake of 9/11 has been necessary to operate […] More
Distinguishing between whistleblowers who want to point out and fix problems within the intelligence community and employees who want to damage national security will demand […] More
For years, the easiest avenue to conduct a cyber attack against a business or an organization was social engineering attacks via emails. While still a […] More
When defense contractor Harold Martin was charged with the alleged theft of highly classified documents from the National Security Agency (NSA), federal prosecutors deemed the […] More
Like many other governments, China is seeking to reestablish its sovereignty over the digital sphere with a new Cybersecurity Law. But while the law could […] More
President Donald J. Trump’s Administration has suggested massive overhauls in a number of policy areas, but few have remained as shrouded in uncertainty as Trump’s […] More
U.S. failure to fully develop and implement a comprehensive cyber security strategy created the perfect opportunity for Russia to attack the Democratic National Committee computer […] More
In the fall of 2008, a bipartisan group of cybersecurity experts delivered some sage advice to Barack Obama, set to become president in January: “Don’t […] More
Presidential inaugurations not only mark the beginning of a new administration, but also the end of one too. As many remain uncertain about the policies […] More
War, often rationalized as an extension of policy by violent means, has always been a deeply human experience. It defines much of human history and, […] More
Bob Work, the Deputy Secretary of Defense, will tell you the Third Offset is the next generation of warfare. It may take at least ten […] More
Imagine a weapon that strikes on its own, without the slightest hint of human judgment or compassion. It’s a chilling prospect, and not so far […] More
Search