Cybersecurity in 2017: Automation, Adversaries and Orchestration
Threat intelligence sharing among vendor and industry peers has come a long way, and in 2017 there will be more opportunities than ever to demonstrate […] More
Threat intelligence sharing among vendor and industry peers has come a long way, and in 2017 there will be more opportunities than ever to demonstrate […] More
Hacktivism has been a fact of life even before the rise of Anonymous. In 2016, we saw a tidal wave of global hacktivism and cyber […] More
Editor’s Note: Over the coming days, The Cipher Brief presents some of our most incisive coverage on key issues of 2016 and a look ahead […] More
The cybersecurity environment is constantly changing. The Cipher Brief spoke with Tammy Moskites, Chief Information Officer at the cybersecurity firm Venafi, who says cybersecurity professionals […] More
With the growth of cybercrime facilitated by the global nature of the Internet, law enforcement is adapting their toolsets to better tackle the challenges presented […] More
What if the U.S. government could force entry—in other words, hack—into electronic devices around the world, using only one warrant, even if the owners of […] More
On December 1, Congress authorized sweeping new government hacking and surveillance authorities by allowing changes to Rule 41 of the Federal Rules of Criminal Procedure […] More
President Barack Obama says the U.S. will respond to the Russia’s interference in the 2016 campaign. In an interview with NPR on Friday, Obama said, […] More
When it comes to attribution—especially when foreign intelligence agencies are involved—plausible deniability is easy. However, the public has come to expect courtroom-quality evidence before believing […] More
Last month, China’s legislature passed the Cybersecurity Law, which is due to take effect next summer. The controversial law has received a number of criticisms […] More
With the pervasive growth of smart phone and tablet use, cybersecurity professionals are worried these devices could present new vulnerabilities to company systems. The Cipher […] More
Cyberspace has grown into a vital domain of everyday life—we work, socialize, play, and conduct financial transactions online. Our lives now have a digital touch, […] More
The use of biometrics to authenticate identity has been the subject of great debate for years, with opposing sides arguing its value for security, privacy, […] More
Amidst a rash of data breaches where compromised passwords provided the vector of attack – think Target, Anthem, OPM, or more recently, the Democratic National […] More
The balance between privacy and security in the digital age will be a key cybersecurity challenge for the next administration, according to former Homeland Security […] More
With organizations and companies continuing to experience breaches in their networks, there is a need for the cybersecurity industry to quickly adapt their strategies so […] More
It’s hard today to find a major breach where weak identity solutions did not provide the vector of attack. More than 21 million personnel records […] More
The Putin government of Russia is conducting cyberspace-enabled Information Operations, including political “destabilizing operations” (a form of warfare), against the United States. Moscow is competing […] More
Search