Iran and Israel Continue Their Shadow Conflict in Cyberspace
Bottom Line Up Front Israeli cyberattacks against Iran are intended to send a signal, as a means of pushing back against Iran’s actions in […] More
Bottom Line Up Front Israeli cyberattacks against Iran are intended to send a signal, as a means of pushing back against Iran’s actions in […] More
Cyber-enabled information operations in the Gulf, such as the one that seemingly spurred the ongoing feud between Qatar and its neighbors, represent the gray line […] More
The use of cyber capabilities to influence geopolitical confrontations has become more and more common. Even those countries who are not major global powers are […] More
Connectivity continues to enmesh businesses, governments, societies and people – a trend that will only accelerate with the growth of public cloud services and devices […] More
In the world of network security, the term air gap refers to a situation in which the computer network is physically separated from other networks, […] More
The White House is looking to take a “proportional” response to Russia’s alleged hacking of U.S. political party organizations and effort to interfere in the […] More
The risk of attack or theft from cyber-enabled actors has been made extremely clear to both private businesses and governments. The last few years have […] More
With the proliferation of many advanced security tools, enterprise and C-Suite managers have recently turned to deploying the most fashionable, powerful, and popular tools on […] More
Large businesses in the United States are putting substantial resources into protecting their information from cybersecurity threats. As a result, they are tougher targets for […] More
Justin Zeefe is a co-founder and Chief Strategy Officer for the Nisos Group. Zeefe spoke with The Cipher Brief about the evolving cyber-threat and how […] More
Few businesses today would think of operating without liability, property, or workers’ compensation insurance and yet, according to a recent survey by CSO magazine, only […] More
Iranian hacks into the social media accounts of U.S. State Department officials are the latest signal from Tehran that it is not looking to turn […] More
Iran is a second tier cyber power. By the standards of other state actors, its capabilities—both offensive and defensive—are relatively modest, but they are growing […] More
Through a series of attacks over the last three years, Iran has revealed a limited offensive cyber capability but a willingness to use it to […] More
To understand what domestic and strategic factors may have encouraged Iran to seek stronger cyber-capabilities, it helps to look at the several ways Iran uses […] More
David Navetta is an attorney who focuses primarily on technology, privacy, information security, and intellectual property law at Norton Rose Fulbright. In an interview with […] More
Does the cyber domain call for a fundamentally different framework for achieving international order in the 21st century, requiring statesmen to critically rethink the art […] More
As President and CEO of FusionX, Matt Devost focuses on cybersecurity and risk management. Devost told The Cipher Brief that offensive cyber operations should rest […] More
Nearly a year ago, we witnessed an act of cyber destruction directed against the networks of Sony Pictures Entertainment. The destruction was serious and somewhat […] More
205 Days. 69 Percent. $3.8 Million. These are important numbers that incident response company Mandiant highlights in their 2015 M-Trends Threat Report and the Poneman […] More
Jim Aldridge is a Director at Mandiant, a FireEye company, and focuses on incident response. Aldridge spoke with the Cipher Brief about the evolving cyber-threat, and […] More
Mayer Brown provides legal services to organizations across the globe and recently released a report entitled Preparing For and Responding to a Computer Security Incident: […] More
Does your organization have a cybersecurity program in place with the primary objective of proactively identifying and managing the cyber threats that you face every […] More