
Assessing the Threat Matrix, from the Mideast to Ukraine to an Anti-U.S. Axis
SUBSCRIBER+ EXCLUSIVE ANALYSIS – From the Middle East to Russia’s war on Ukraine, cybersecurity to disinformation to the emergence of an axis of powers – […] More
SUBSCRIBER+ EXCLUSIVE ANALYSIS – From the Middle East to Russia’s war on Ukraine, cybersecurity to disinformation to the emergence of an axis of powers – […] More
Bottom Line: In the digital age, determining the origins of cyberattacks is already difficult, but cyber actors can further muddy attribution by diverting blame for […] More
Mr. President, as you know the United States has faced cyber attacks of increasing frequency and viciousness from our adversaries. Your NSC is about to […] More
The Cipher Brief hosted its second annual threat conference at beautiful Cloister Resort on Sea Island, Ga., this month. While there, Dmitri Alperovitch and I […] More
The United States is in the midst of the most resounding policy shift on cyber conflict, one with profound implications for national security and the […] More
History suggests that applying the wrong operational framework to an emerging strategic environment is a recipe for failure. During the World War I, both sides […] More
The Trump administration has accused Russia of a coordinated “multi-stage intrusion campaign” to hack into critical U.S. infrastructure networks and conduct “network reconnaissance” while attempting […] More
Jason Healey recently posted an interesting piece on The Cipher Brief, US Cyber Command: “When faced with a bully…hit him harder.” Healey writes: “Cyber Command’s new […] More
In Washington, there may be division and confusion about how to deal with Russian cyber-based interference. But 25 miles north, at Fort Meade, home of […] More
During times when the country expresses passionate opinions over the politics of the day, I wonder what U.S. adversaries focus on. One thing always in […] More
Bottom Line: Maturing under Tehran’s tutelage, Hezbollah’s hackers are quickly learning the art of cyber warfare. The formidable militant organization is increasingly turning its attention […] More
The range of ferocious offensive cyber attacks by revisionist and rogue powers in recent years makes clear that the U.S. and its allies are fully […] More
Bottom Line: Cyber vigilantes and “hacktivists” increasingly fill the void left by governments in combating terrorist activity online. While such politically motivated non-state hackers are […] More
For this last week of 2017, we asked our experts to look ahead at key national security issues. NSA veteran Rick Ledgett offers some cybersecurity lessons […] More
Tehran poses an increasing cyber threat to the U.S., in light of the Trump administration’s allegations that Iran is violating United Nations Security Council resolutions […] More
Earlier this month, two members of the House of Representatives Tom Graves (R-GA) and Kyrsten Sinema (D-AZ) introduced a bill called Active Cyber Defense Certainty […] More
Deterrence is based on the elements of denial (denying an adversary’s attempt to attack our interests) and punishment (inflicting unacceptable costs to the attacker in […] More
The Cipher Brief Cyber Advisory Board convenes meetings with some of the most innovative thinkers across government and the private sector, tackling a range of […] More
In the nearly seven years since the U.S. Department of Defense declared cyberspace a “domain” of warfare – alongside land, air, sea, and space – […] More
Search