Rolling Up the Red Carpet: Responding to Russian Covert Actions
When the Russian intelligence operation designed to influence our 2016 election is used as a case study to train new Russian intelligence officers, it will […] More
When the Russian intelligence operation designed to influence our 2016 election is used as a case study to train new Russian intelligence officers, it will […] More
War, often rationalized as an extension of policy by violent means, has always been a deeply human experience. It defines much of human history and, […] More
With news of nation-states allegedly attacking companies, political institutions, and world governments, it is important to know how attribution works in cybersecurity. For the unfamiliar, […] More
Will the U.S. government see a large-scale breach in 2017? Common sense would say yes, whether by size, like the Office of Personnel Management, suspicion, […] More
Surveillance law is absolutely necessary because it compels the government to write down, for all to clearly see, the rules that they must abide by […] More
On November 29, Royal Assent was given to the UK Investigatory Powers Act, after eight months of intensive Parliamentary scrutiny, with hundreds of amendments made, […] More
On January 1st, the United Kingdom began the implementation of the Investigatory Powers Act, widely considered the most comprehensive—and intrusive—surveillance law in the Western world. […] More
Russian President Vladimir Putin ordered a cyber and influence campaign aimed at interfering in the United States election and boosting President-elect Donald Trump’s chances, according […] More
The Russian hacking of the Democratic National Committee (DNC) and subsequent leaking of sensitive internal communications has remained front and center in the U.S. consciousness. […] More
Much like with traditional crimes, cybercrimes leave a trail of breadcrumbs that, if assembled correctly, can create a reliable understanding of what occurred and can […] More
It’s safe to say 2016 was a banner year for cyber attacks and data breaches. Whether talking about an organization, or even a nation-state, the […] More
Butch Cassidy graphically demonstrated that there ain’t no rules in a knife fight. Well, so far, there ain’t no rules in cyberspace or precious few […] More
Russian President Vladimir Putin said in a statement Friday that he will not expel U.S. diplomats in response to U.S. sanctions imposed on Russia yesterday […] More
Threat intelligence sharing among vendor and industry peers has come a long way, and in 2017 there will be more opportunities than ever to demonstrate […] More
In July, Rob Dannenberg, the former head of security at Goldman Sachs and a 24-year veteran of the CIA, discussed Russia’s cyber strategy of information […] More
Editor’s Note: Over the coming days, The Cipher Brief presents some of our most incisive coverage on key issues of 2016 and a look ahead […] More
Back in August, The Cipher Brief sat down with Leo Taddeo, Chief Security Officer for Cryptzone, to discuss the cyber threats posed by Russia and […] More
What if the U.S. government could force entry—in other words, hack—into electronic devices around the world, using only one warrant, even if the owners of […] More
Search