Skip to content
Search

Latest Stories

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Cyberattack

Tariffs Overlook Gray Zone Threats Posed by China

OPINION — The recent tariffs against China are obviously getting a lot of attention. China is a major trading partner, so the idea of an escalating [...] More

The Latest

CTIIC’s Role in Keeping America Safe in Cyber

One day last May, employees of Britain’s health service logged on to their computers to find a startling discovery: their data had been encrypted, [...] More

Ghosts in the Machine that Can Rob You Blind

It was almost a devastatingly effective cyber-heist. Hackers compromised the Kathmandu-based NIC Asia Bank this fall, fraudulently transferring $4.4 [...] More

Trump, Putin Set to Meet as Russia Uses Hybrid Warfare Against Ukraine

Trump, Putin Set to Meet as Russia Uses Hybrid Warfare Against Ukraine

President Donald Trump and Russian President Vladimir Putin’s first meeting later this week comes against the backdrop of a cyberattack thought to be [...] More

Cipher Brief Cyber Advisory Board: Identifying the “Emerging Hacker”

Cipher Brief Cyber Advisory Board: Identifying the “Emerging Hacker”

In the early days of the internet, criminals quickly saw the new technology as an avenue for data theft, extortion, and uninhibited global reach. [...] More

Putin Aiming for Our Democracy

On Friday, The Washington Post published a detailed account of the challenge the Obama administration faced in the run up to the 2016 presidential [...] More

After Manchester—NATO Must Step Up Counterterror Ops

On the heels of President Donald Trump’s Middle East tour and the terror attack in Manchester outside of an Ariana Grande concert this week, Trump [...] More

Russia Walks the Line Between War and Peace in the Baltics

Russian offensive cyber capabilities are as sophisticated as those of other major cyber powers, such as the United States and China, and they likely [...] More

Watching Cybernorms Get Made

Butch Cassidy graphically demonstrated that there ain’t no rules in a knife fight. Well, so far, there ain’t no rules in cyberspace or precious few [...] More

Offensive Security Has Value

With organizations and companies continuing to experience breaches in their networks, there is a need for the cybersecurity industry to quickly adapt [...] More

After the Breach: Response and Recovery

As the number of corporate data breaches continues to mount, boards and management teams around the world are justifiably concerned about the [...] More