The Myth of Cyber Deterrence
Deterrence theory formed the foundation of the narratives and the strategies that shaped the Cold War, and many now seek to apply classical deterrence to […] More
Deterrence theory formed the foundation of the narratives and the strategies that shaped the Cold War, and many now seek to apply classical deterrence to […] More
The court order demanding Apple create an encryption-breaking tool was never about a single iPhone. A disclosure in a federal court yesterday revealed that the […] More
There is a massive problem in cybersecurity, and it has been growing for years. This problem is not a malicious program, or a rogue nation-state, […] More
There is a dearth of talent in the cybersecurity industry, and the talent that does exist tends to be very specific, with some skill sets […] More
Industry data regarding the cybersecurity skills shortage continues to paint a disturbing picture. For example: “The Cipher Brief has become the most popular outlet for […] More
With the Super Bowl just completed, corporate America might take this as a good time to step back and reevaluate how strong its offensive and […] More
A serious, potential malware threat has been detected on the systems that control many aspects of critical infrastructure in the United States. These industrial control […] More
Industrial control systems (ICS) underly many aspects of our critical infrastructure, and there are concerns that they are becoming more vulnerable to hackers. The Cipher […] More
Industrial control systems are a profoundly important part of the critical infrastructure of the United States, but they are also increasingly vulnerable to cyber-attacks. The […] More
Cyber-crime and cybersecurity are locked in a perpetual competition – whenever one advances, the other changes to counter it. With every iteration of this contest, […] More
Ransomware is a relatively new type of threat, and like most malware it is constantly changing. Ryan Olson is the director of the threat intelligence […] More
The Internet of Things is poised to become as revolutionary as the Internet itself, but there are some major threats that must be dealt with […] More
One of the key lessons of 2015 was that cybersecurity is more important than ever – a lesson that Sony and the Office of Personnel […] More
Countering cyber-threats can be difficult, and information sharing has come to be seen as a constructive way to attack the problem. Elaine Lammert, a former […] More
Threat intelligence sharing has a complex history within the security industry. The premise is simple: cybercriminals will often launch attacks with similar components, using the […] More
Late last year, the text of the Cybersecurity Information Sharing Act (CISA) found its way into a consolidated spending bill and was signed into law […] More
Estonia packs a punch in the cyber domain. The country is a world leader in cyber-related innovation, and it has charted that course without compromising […] More
The legacy of the Cold War has left many enduring images in the minds of most Americans, images that are usually associated with Russia and […] More
Search