Posts Tagged ‘cyber attack’

Briefs & Analysis

Steps You Should Take

Large businesses in the United States are putting substantial resources into protecting their information from cybersecurity threats. As a result, they are tougher targets for […] More

Briefs & Analysis

Understand Your Exposure

Justin Zeefe is a co-founder and Chief Strategy Officer for the Nisos Group.  Zeefe spoke with The Cipher Brief about the evolving cyber-threat and how […] More

Briefs & Analysis

Cybersecurity Insurance

Few businesses today would think of operating without liability, property, or workers’ compensation insurance and yet, according to a recent survey by CSO magazine, only […] More

Briefs & Analysis

Punching Above its Weight

Iranian hacks into the social media accounts of U.S. State Department officials are the latest signal from Tehran that it is not looking to turn […] More

Briefs & Analysis

A Second-Tier Cyber Power

Iran is a second tier cyber power. By the standards of other state actors, its capabilities—both offensive and defensive—are relatively modest, but they are growing […] More

Briefs & Analysis

A "Brown Water" Navy

Through a series of attacks over the last three years, Iran has revealed a limited offensive cyber capability but a willingness to use it to […] More

Briefs & Analysis

Iran: A Rising Cyber Power?

To understand what domestic and strategic factors may have encouraged Iran to seek stronger cyber-capabilities, it helps to look at the several ways Iran uses […] More

Briefs & Analysis

Hacking Back: Liability and Risks

David Navetta is an attorney who focuses primarily on technology, privacy, information security, and intellectual property law at Norton Rose Fulbright.  In an interview with […] More

Briefs & Analysis

Statecraft in Cyberspace

Does the cyber domain call for a fundamentally different framework for achieving international order in the 21st century, requiring statesmen to critically rethink the art […] More

Briefs & Analysis

The Government’s Domain

As President and CEO of FusionX, Matt Devost focuses on cybersecurity and risk management.  Devost told The Cipher Brief that offensive cyber operations should rest […] More

Briefs & Analysis

The Cyber Attribution Challenge

Nearly a year ago, we witnessed an act of cyber destruction directed against the networks of Sony Pictures Entertainment.  The destruction was serious and somewhat […] More

Briefs & Analysis

Recovering from a Cyber Attack

205 Days. 69 Percent. $3.8 Million. These are important numbers that incident response company Mandiant highlights in their 2015 M-Trends Threat Report and the Poneman […] More

Briefs & Analysis

Incident Response

Jim Aldridge is a Director at Mandiant, a FireEye company, and focuses on incident response. Aldridge spoke with the Cipher Brief about the evolving cyber-threat, and […] More

Briefs & Analysis

The First 72 hours

Mayer Brown provides legal services to organizations across the globe and recently released a report entitled Preparing For and Responding to a Computer Security Incident: […] More

Briefs & Analysis

Blindspots to Avoid

Does your organization have a cybersecurity program in place with the primary objective of proactively identifying and managing the cyber threats that you face every […] More

Search

Close