An attempted cyberattack on Israel’s water system in late April, just months after the global pandemic hit, prompted fears that cyber adversaries are getting even more bold in their efforts to cause harm. Israel’s national cyber chief, Yigal Unna, officially acknowledged the plot, calling it a ‘synchronized and organized attack’ ...

Robert Griffin is the Managing Partner for DVI Equity Partners a Private Equity Investment arm of Diamond Ventures where he focuses on technology investments concentrated on delivering disruptive or disintermediating technology in areas of national security, law enforcement, critical infrastructure, and emerging trends. Bob has been a key player and ...

OPINION -- The US is taking a more active role in the ongoing cyber war between Russia and Ukraine on the side of the Kiev government. On May 14, the US Agency for International Development (USAID) announced the award of a four-year, $38 million contract to provide cyber security for critical ...

We know that corporate boards can no longer afford to leave cyber to the IT team. In the future, (which is now) they need to be actively engaged in cybersecurity and they need to know how to do it from a strategic level. Particularly in a time when many companies ...

This column is part of our new series, ‘From the C-Suite’, focused on bringing you perspectives on threats as they see them from leaders in the private sector.  Eric Hipkins is the founder and CEO of R9B, a provider of cybersecurity training, products and services for the U.S. Department of ...

This column is part of our new series, ‘From the C-Suite’, focused on how leaders from the private sector are driving change and innovation in the national security and business security space. We’ll bring you insights on the threats as they see them and notes on their personal journeys, motivations, ...

This column is part of our new series, ‘From the C-Suite’, focused on how leaders from the private sector - in their own words - are driving change and innovation in the national security space. We’ll bring you insights on the threats as they see them and notes on their ...

BOOK REVIEW:  The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics by Ben Buchanan Reviewed by Peter M. Tran Peter M. Tran is a former NCIS Special Agent and information security, cyber defense technology, and security operations expert.  He has over 20 years of experience developing and ...

 Sean Roche is former Associate Deputy Director of CIA for Digital Innovation. The Directorate of Digital Innovation (DDI) was created to accelerate the integration of advanced digital capability across all of CIA’s mission areas and is responsible for a wide range of espionage missions including cyber intelligence, open source collection, secure global communications, ...

Sean Roche is former Associate Deputy Director of CIA for Digital Innovation. The Directorate of Digital Innovation (DDI) was created to accelerate the integration of advanced digital capability across all of CIA’s mission areas and is responsible for a wide range of espionage missions including cyber intelligence, open source collection, secure global communications, ...

‘Quantum computing’ is a phrase used more frequently in national security conversations these days. What does it mean?  In its simplest definition, quantum computing involves the behavior of sub-atomic particles in computing, which translates into a fundamentally different way computers can solve problems.  Quantum computing is part of an emerging ...

Thomas Donahue is a Cipher Brief expert and former Senior Director for Cyber Operations on the U.S. National Security Council Staff.  His article was originally published by National Defense University Press PRISM. As a global power, the United States must be able to sustain military forces and project power anywhere ...

OPINION -- The Trump administration’s new attempt to open strategic nuclear talks with China “ASAP,” as mentioned in a State Department tweet last Friday, focuses on the wrong subject. Any talks about strategic deterrence among nations should be dealing first with the future of cyber warfare and weaponry rather than ...

It is no secret that Hermione revealed that the basilisk traveled via the pipes in the second installment of the Harry Potter series. When I began my consulting career with the National Communications System (NCS) and cybersecurity became the sexy cousin, the communications muggles liked to remind the cyber wizards ...

Tom Bossert spends a lot of time thinking about hacking.  The former Homeland Security Advisor to President Trump who also served as the country’s Chief Risk Officer and Senior Advisor on cyber, left his White House position in 2018. It happened just after Bossert spoke at The Cipher Brief’s Annual ...

  Bottom Line Up Front In 2019, it is easier than ever for nation-states or wealthy individuals to pay virtual mercenaries to conduct a range of illicit activities including espionage, data theft, and cyber intimidation and harassment. Companies require permits from their respective governments to export surveillance software, but government ...

Ben Buchanan recently testified at a House Homeland Security Subcommittee Meeting on Preparing for the Future:  An Assessment of Emerging Cyber Threats.  He is a Senior Faculty Fellow, Center for Security and Emerging Technology, Mortara Center, Assistant Teaching Professor, Georgetown University.  Cybersecurity, already rife with challenges, is becoming even more complex with the rise ...

SPONSORED CONTENT -- As I’ve talked to many Department of Defense leaders over the years, I’ve often heard them ask, “how much would a pound of cybersecurity for a weapon system cost me?” Truthfully, up until this point, we had a difficult time responding. That is, until now – more ...

“My personal view is, the first shots of the future fight will be either in the cyber domain or -- maybe it's an ‘and’ -- and the space domain.  And so we've got to make sure we have sufficient capability there because that's critical to our capabilities to fight and ...

This Cyber Viewpoint comes from James Van de Velde, Associate Professor at the National Intelligence University as well as Adjunct Faculty at Johns Hopkins and Georgetown University. The views expressed in this article are those of the author and do not necessarily reflect the official policy position of the U.S. ...

The Cyber Initiatives Group is a group of public - private and academic thought leaders who share their unique expertise with the greater cyber community through a series of CIG webcasts and in-person events throughout the year. This is a preview webcast exclusively for The Cipher Brief, where readers were briefed ...

NSA Director General Paul Nakasone announced last week that he is creating a new cybersecurity directorate that will focus on – among other things – aligning the agency’s resources on both offense and defensive cyber operations. “What I’m trying to get to in a space like cybersecurity is speed, agility ...

Cybersecurity firm Finite State issued a recent report concluding that telecommunications equipment made by Chinese firm Huawei present a higher percentage of security vulnerabilities than equipment produced by other firms. A story in The Wall Street Journal citied numerous sources inside the Administration who pointed to the report as further ...

Few today would argue that the threat surface in cyberspace has expanded significantly in the past decade.  Just ask your fridge.  From the new risks we’ve brought into our own kitchens, to the increased capabilities of nation states to disrupt everything from electricity to elections, there is an even greater ...

Iran’s Foreign Minister Javad Zarif confirmed Monday that Tehran has violated the limits imposed on uranium enrichment that were a key part of the 2015 nuclear deal.  The U.S. withdrew its support for the deal last year.  The Trump Administration on Monday responded to the confirmation of increased uranium enrichment, ...

Earlier this week, The Cipher Brief brought you expert insights into How Iran Targets U.S. Businesses, after a warning last weekend by DHS’ Cybersecurity and Infrastructure Security Director Christopher Krebs.    “Iranian regime actors and proxies are increasingly using destructive ‘wiper’ attacks, looking to so much more than just steal ...

There are a few more details coming out about last week’s cyber targeting of an Iranian-backed group by the U.S. military. Sources told CNN that the goal was to “disable and degrade” an Iranian-backed group that operates forces in Iraq and Syria by disabling their communications systems. The latest details ...

U.S. businesses are being warned to harden their defenses in anticipation of potential cyberattacks as tensions between the U.S. and Iran continue to escalate.  President Donald Trump posted to Twitter on Tuesday that “Any attack by Iran on anything American will be met with great and overwhelming force.  In some ...

Investigative journalist Joseph Menn, author of the recently released Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World has a history of writing books to explain the often-complicated intersection of history, technology and moral decision-making. His latest book traces the origins of a once ...

Defending New Yorkers against criminals and terrorists has been a priority for city leaders and law enforcement for quite some time, but in the last couple of years, officials have taken more aggressive steps to protect the city from the threat actors that often go unseen but can wreak havoc ...

Japan’s cybersecurity will be put to the test over the next 18 months. The world’s attention will be fixed on the island country as it hosts two major events: the Rugby World Cup in September and the Tokyo Olympics in 2020. The tournaments will likely be an attractive target for ...

BOOK REVIEW:  Cult of the Dead Cow – How the Original Hacking Supergroup Might Just Save the World  By Joseph Menn  Reviewed by Christopher Messina Joseph Menn has good timing. The topic of cybersecurity has attained a degree of cultural currency that is still waxing. His book is part historical ...

Cipher Brief Expert and former Director of the NSA, General Keith Alexander  (Ret.) and Jamil N. Jaffer, founder of the National Security Institute at George Mason University, weigh in on possible Iranian responses to recent U.S. actions in a column first published in The Hill. General Keith Alexander (Ret.), Former ...

The White House issued a recent Executive Order on America’s Cybersecurity Workforce in an effort to put a renewed focus on the federal government’s deficit of some 300,000 cybersecurity practitioners. The EO directs federal agencies including the Department of Homeland Security, the Department of Defense, the White House Office of ...

The advent of 4G technology in 2006 and subsequent Smartphones completely changed the world of communication. Now 5G, which will be able to support billions of newly connected sensors and new classes of devices, stands to make an exponentially larger global impact. With 5G’s expanded accessibility to internet services across ...

BOOK REVIEW:  Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations Edited by Herbert Lin and Amy Zegart, Brookings Institution Press Reviewed by George M. Moore, scientist-in-residence at the James Martin Center for Nonproliferation Studies (CNS) at the Middlebury Institute of International Studies at Monterey.  This collection published by the ...

Christopher Painter has been on the vanguard of U.S. and international cyber issues for over twenty-five years and serves as a current Commissioner on the Global Commission for the Stability of Cyberspace.  He is also a Perry Fellow at the Center for International Security and Cooperation at Stanford University. Painter ...

Cipher Brief Expert Thomas Donahue retired from CIA after 32 years of service. He served as the Chief Editor of the President’s Daily Brief and other CIA daily production during the second term of the Clinton administration, and spent the last 18 years of his career focused on cyber threats ...

The U.S. and China are rapidly sliding into a full-court confrontation in and over cyberspace. This portends serious risks and disadvantages for both sides in light of their economic and technological interdependence. It is bound to have even greater reverberations internationally, given that both countries serve as the world’s leading ...

The Cipher Brief spoke with Nils Puhlmann, a co-founder of the Cloud Security Alliance, about the security challenges he sees ahead as demand for Cloud services increases. The Early Days of the Cloud When the Cloud came about, it was really convenient and easy.  You had your browser, you logged ...

Predicting the future of Cloud computing is a bit like predicting the weather:  there are certain knowns that you can set a clock by, but there are unknowns about the environment, and how conditions can collide as the volume of information placed in the Cloud increases. A Gartner survey conducted ...

When DHS was established shortly after 9/11, terrorism was the focus. But in the 16 years since the Agency’s creation, the threat landscape has changed dramatically and cyber now plays a leading role in overall threats. Four months ago, President Trump signed the Cyber Security and Infrastructure Security Agency Act, ...

Cipher Brief Expert and former Senior Director for Cyber Operations at the National Security Council, Thomas Donahue, provides critical perspective on the strategy needed to protect the sovereignty of the U.S. telecommunications backbone. The U.S. Government - by blocking the sale of U.S. high technology firms to foreign companies for ...

The debate on cyber conflict has gotten so locked into deterrence, escalation, coercion, and signaling we pundits often forget that conflict is sometimes straightforward and you just have to stop adversaries from punching you. This ought to be the main lesson from Ellen Nakashima’s article that U.S. Cyber Command disrupted ...

U.S. officials recently detailed an offensive cyber operation undertaken by U.S. Cyber Command to The Washington Post, revealing how the military blocked Internet access to St. Petersburg’s Internet Research Agency on the day of the U.S. midterm elections last year. “The operation marked the first muscle-flexing by U.S. Cyber Command, ...

Last week, The Cipher Brief told you how and why the U.S. has been working to convince its allies to ban Chinese vendors from contributing to the development of 5G networks as well as offering some basics about what 5G actually is, and what we should be most focused on as ...

A hundred years from now historians will write that one of America’s greatest contributions to the world was the Internet. Though other countries and foreign citizens contributed to the effort, U.S. government funding and American academics and technologists created the Internet. As U.S. dependence on the Internet for our economic ...

Cyber has quickly become the global threat that knows no borders, nor does it distinguish between the public and private sectors.  Executives from the world’s largest tech companies gathered at the World Economic Forum in Davos last month to talk about the problem and try to find solutions that could ...

Like many cyber experts in Washington, Jamil Jaffer wears multiple hats. He’s worked both inside and outside of government and is currently the Vice President of Strategy and Partnerships at IronNet Cybersecurity, Founder of the National Security Institute at George Mason University and a Visiting Fellow with Stanford’s Hoover Institution. ...

Catherine Lotrionte has been the power broker behind Washington D.C.’s International Conference on Cyber Engagement for seven years now and she’s getting ready to host it again this April with The Atlantic Council.  Formerly serving as Counsel to the President’s Foreign Intelligence Advisory Board and former Assistant General Counsel at ...