One day last May, employees of Britain’s health service logged on to their computers to find a startling discovery: their data had been encrypted, rendering it inaccessible until and unless they paid a ransom to have their data unscrambled and their access to it, returned. They were the first known ...

It was almost a devastatingly effective cyber-heist. Hackers compromised the Kathmandu-based NIC Asia Bank this fall, fraudulently transferring $4.4 million to destinations in at least six other countries, according to local media reports. All but $580,000 of the funds were recovered by mid-November, after Nepal asked the destination countries to ...

In the early days of the internet, criminals quickly saw the new technology as an avenue for data theft, extortion, and uninhibited global reach. These criminals found safe haven behind anonymizing technology and governments slow or unwilling to solve the puzzle presented by borderless technology. The intersection of national security ...

On Friday, The Washington Post published a detailed account of the challenge the Obama administration faced in the run up to the 2016 presidential election as the U.S. intelligence community repeatedly raised concerns of Russian hacking. The story is striking in the regret expressed by former Obama officials and the ...

On the heels of President Donald Trump’s Middle East tour and the terror attack in Manchester outside of an Ariana Grande concert this week, Trump and his fellow European heads of state are gathering in Brussels for a NATO summit. The Cipher Brief’s Kaitlin Lavinder asked former NATO Supreme Allied ...

Russian offensive cyber capabilities are as sophisticated as those of other major cyber powers, such as the United States and China, and they likely exceed Baltic states’ ability to defend critical infrastructures. A successful large-scale cyberattack during peace time, or prior to or in concert with a conventional attack – ...

Butch Cassidy graphically demonstrated that there ain’t no rules in a knife fight.  Well, so far, there ain’t no rules in cyberspace or precious few at least.  Establishing those rules and practices may take years, as it did for nuclear weapons or cold war spying.  The U.S. response to the ...

With organizations and companies continuing to experience breaches in their networks, there is a need for the cybersecurity industry to quickly adapt their strategies so that they are inspecting the entire chain of steps leading up to a breach as well as taking an attacker point-of-view into where vulnerabilities exist ...

As the number of corporate data breaches continues to mount, boards and management teams around the world are justifiably concerned about the reputational risks from mishandling a breach. In the wake of a string of high-profile breaches across a range of sectors, from entertainment and health care to retail and ...