Cybersecurity

Recovering from a Cyber Attack

205 Days. 69 Percent. $3.8 Million. These are important numbers that incident response company Mandiant highlights in their 2015 M-Trends Threat Report and the Poneman […] More

Incident Response

Jim Aldridge is a Director at Mandiant, a FireEye company, and focuses on incident response. Aldridge spoke with the Cipher Brief about the evolving cyber-threat, and […] More

The First 72 hours

Mayer Brown provides legal services to organizations across the globe and recently released a report entitled Preparing For and Responding to a Computer Security Incident: […] More

Blindspots to Avoid

Does your organization have a cybersecurity program in place with the primary objective of proactively identifying and managing the cyber threats that you face every […] More

The Rise of Israel’s Tech Sector

The emerging world of ever-growing connectivity, cybersecurity, and cyber-threats has initiated an uncontrolled transformation in the balance of global superpowers. The old notion of power […] More

Synergy with Silicon Valley

Bear in mind, when considering the relationship between Silicon Valley and Israel, this is not Detroit versus Tokyo. It’s not that sort of nationalistic, zero-sum […] More

Cybersecurity: The Human Factor

People are the weakest link in any cybersecurity system.  Conversations about the cyber issue typically focus on systems, the primary targets of hackers and cyber […] More

The Insider Threat

Mitch Silber is the Senior Managing Director at FTI Consulting, a global business advisory firm.  He spoke with the Cipher Brief about the threat posed […] More

The Outsider Threat

Lillian Ablon is a cybersecurity researcher at the RAND Corporation. She spoke with The Cipher Brief about the threat posed by social engineering, and the […] More

Creating a Culture of Security

Information security has a problem; an awkward border that we have consistently failed to understand and protect. This constantly changing, infinitely variable border is known […] More

Protecting Your Business

Heroes in war movies rally the troops by pronouncing: failure is not an option. Heroes at the forefront of cybersecurity know better: failure is practically […] More

Post-Incident Response

The ability of a business to respond with speed and agility after the discovery of a significant cyberattack is critical to its overall recovery and […] More

Speed & Network Visibility

Heroes in war movies rally the troops by pronouncing: failure is not an option. Heroes at the forefront of cybersecurity know better: failure is practically […] More

Toward a Comprehensive Approach

The Cipher Brief spoke with Raj De to discuss the Cybersecurity Information Sharing Act (CISA). Mr. De recently served as the General Counsel at the […] More

Search

Close