Unprecedented Opportunities and Vulnerabilities
Cyber threats pose a challenge to banks and firms operating in the financial sector, primarily due to the fact that “vulnerability really exists everywhere,” both […] More
Cyber threats pose a challenge to banks and firms operating in the financial sector, primarily due to the fact that “vulnerability really exists everywhere,” both […] More
The Cipher Brief sat down with Steven Grossman, VP of Strategy and Enablement at Bay Dynamics, to discuss the current cyber threat landscape facing the […] More
American businesses lose an estimated $160 billion to $480 billion annually due to trade secret misappropriation. To combat this loss, over the past few years […] More
There are two different types of insider threat: negligent and malicious. Negligent insiders are people who give attackers access by mistake. For example, the employee […] More
The Cipher Brief sat down with Stuart Clarke, Chief Technical Officer for Cybersecurity at Nuix, to discuss how the visualization of data plays a critical […] More
Behavioral profiling plays an important role in the wider effort to counter cyber threats, explains Steve Bongardt, VP of Security Consulting Services at Fidelis Cybersecurity. […] More
The controversial new movie “Snowden,” which is provocative director Oliver Stone’s take on NSA leaker Edward Snowden, was released in the United States on Friday. […] More
Every day, the line between cyber-threats and physical threats grows thinner – blurring the crucial distinction between attacks on networks and attacks on materials objects. […] More
The Cipher Brief’s Luke Penn-Hall sat down with Steve Grobman, Intel Fellow and Chief Technology Officer for Intel Security, at the annual Black Hat cybersecurity […] More
The Cipher Brief’s Luke Penn-Hall spoke to Tom Parker, Chief Technology Officer for FusionX, at the annual Black Hat cybersecurity conference that took place in […] More
Given the growth of the cyber-threat matrix, many IT system users have found that conventional defenses—firewalls, anti-virus applications, blocking software, and malware detection regimes—are only […] More
If my first day at Black Hat was all about insider threats and ransomware, my second was focused on attackers. I had the opportunity to […] More
The Cipher Brief’s Luke Penn-Hall is currently attending Black Hat, a premiere information security conference in Las Vegas, Nevada. Here’s his update from Day 1: […] More
Trying to keep malware off your computer is standard practice at this point, but not many people know that malware also poses a threat to […] More
A global cybersecurity talent crisis is threatening both the public and private sectors, a new report released on Wednesday has found, leaving businesses and countries […] More
As hackers continue to grow more sophisticated, many firms are struggling to find ways to ensure that their systems are secure. In support of that […] More
Hillary Clinton may have dodged an indictment when the FBI announced it would not recommend criminal charges against her for using a private email server […] More
One year ago, on July 10, 2015, Katherine Archuleta resigned her position as Director of the Office of Personnel Management (OPM) in the face of […] More
Search