The Tech Must Flow
Although often hamstrung by bureaucratic inefficiency, the U.S. government has achieved considerable success in the field of scientific research. In fact, many indispensible products have […] More
Although often hamstrung by bureaucratic inefficiency, the U.S. government has achieved considerable success in the field of scientific research. In fact, many indispensible products have […] More
In 2009 I left a job at the Defense Advanced Research Projects Agency (DARPA) and started Siege Technologies. My goal was to fill the vacuum […] More
The tech sector is known for its rapid innovation, but that quality is often believed to be absent from the federal government. However, that may […] More
Secretary of Defense Ash Carter on Wednesday announced shakeups to the Pentagon’s tech-sector outreach, with a new outpost in Boston and major changes for the […] More
What do you use your phone for in a given day? Texting, checking the news, social media, banking, getting directions, playing games – most people […] More
Bring-your-own-device culture is very convenient, but with a growing amount of malware targeting mobile devices, it is also creating new vulnerabilities. The Cipher Brief spoke […] More
As malware continues to grow and change, the number and types of at-risk devices will do the same. Currently, malware oriented towards mobile devices is […] More
Everyone knows that they need to protect their computers from hackers, but have you ever considered what would happen if someone hacked your car? Automakers […] More
It is hard to miss the frightening headlines about car hacking scenarios. But in reality, there’s more to automotive cyber security. Hackers may be individuals […] More
Cars, like many other everyday objects, are now more connected to wireless networks than ever before – and this has caused a corresponding rise in […] More
Over the last week, startup CEOs and defense industry experts have been ramping up efforts to push for a more agile, fast-paced way of dealing […] More
Access to cloud-based infrastructure has revolutionized how businesses store and work with their data, but the convenience of cloud-based systems is not without risk. The […] More
Way back in the 18th century, Ben Franklin said, “Distrust and caution are the parents of security.” That insight is entirely appropriate in the 21st […] More
When it comes to Silicon Valley buzzwords, “the cloud” is one of the most ubiquitous and one of the most misunderstood. The cloud is essentially […] More
On Friday, Dyn, a company that routes and manages internet traffic, suffered multiple Distributed Denial of Service (DDoS) attacks throughout the day. Major sites such […] More
Some stunning things have happened in the past year. Cars were remotely hacked and run off the road. Thieves digitally stole cars in volume, at […] More
The Internet-of-Things has for years promised to usher in a new wave of innovation. It has sometimes been called the Internet-of-Everything or Internet 3.0—grand language […] More
Dark Hotel, Crouching Yeti, Machete, Sofacy, Sandworm – what do these words have in common? They are all names given to hacker groups that have […] More
Search