Moscow’s Cyber Buildup
The legacy of the Cold War has left many enduring images in the minds of most Americans, images that are usually associated with Russia and […] More
The legacy of the Cold War has left many enduring images in the minds of most Americans, images that are usually associated with Russia and […] More
With the proliferation of many advanced security tools, enterprise and C-Suite managers have recently turned to deploying the most fashionable, powerful, and popular tools on […] More
Large businesses in the United States are putting substantial resources into protecting their information from cybersecurity threats. As a result, they are tougher targets for […] More
Justin Zeefe is a co-founder and Chief Strategy Officer for the Nisos Group. Zeefe spoke with The Cipher Brief about the evolving cyber-threat and how […] More
Few businesses today would think of operating without liability, property, or workers’ compensation insurance and yet, according to a recent survey by CSO magazine, only […] More
After the United States emerged from the Vietnam War, it witnessed the events of the 1973 Yom Kippur War—a state-level conflict fought against Israel by […] More
Thomas Mahnken is the Jerome E. Levy Chair of Economic Geography and National Security at the U.S. Naval War College and served as Deputy Assistant […] More
Davis Hake is the Director of Cybersecurity Strategy for Palo Alto Networks and a former official at the Department of Homeland Security. Hake spoke with […] More
Periodically, The Cipher Brief profiles an up and coming leader in the cybersecurity and national security fields. This week we introduce you to Angela Knox, […] More
Chris Young is the general manager of the Intel Security Group at the Intel Corporation, where he leads the company’s security practice. Young sat down […] More
Cybersecurity has not only dominated the headlines in the wake of the U.S. Office of Personnel Management (OPM) and Sony hacks, it has become a […] More
To understand what domestic and strategic factors may have encouraged Iran to seek stronger cyber-capabilities, it helps to look at the several ways Iran uses […] More
Iranian hacks into the social media accounts of U.S. State Department officials are the latest signal from Tehran that it is not looking to turn […] More
Iran is a second tier cyber power. By the standards of other state actors, its capabilities—both offensive and defensive—are relatively modest, but they are growing […] More
Through a series of attacks over the last three years, Iran has revealed a limited offensive cyber capability but a willingness to use it to […] More
Hollywood has a clear idea of what it would look like if someone used cyber-capabilities against us: a man in a room full of screens […] More
David Navetta is an attorney who focuses primarily on technology, privacy, information security, and intellectual property law at Norton Rose Fulbright. In an interview with […] More
Search