Despite the concerns of privacy advocates, the Senate has passed cybersecurity legislation, creating a process for the government and private industry to share information on cyber attacks.    The Cybersecurity Information Sharing Act (CISA) was overwhelmingly approved by a 74-21 vote on Tuesday.   It must now be reconciled with two similar ...

The emerging world of ever-growing connectivity, cybersecurity, and cyber-threats has initiated an uncontrolled transformation in the balance of global superpowers. The old notion of power relying on the number of aircraft and missiles a country owns has expanded to include new terms—terms such as the magnitude of a denial of ...

Ronen Nir is a General Partner at Carmel Ventures, a venture capital firm based in Israel. Prior to joining Carmel Ventures, he worked for several Israeli tech companies and served in the Israeli Defense Force’s Intelligence Unit for 13 years. We spoke with Nir about the state of the Israeli ...

Rhea Siers is the Scholar In Residence at the George Washington University Center for Cyber and Homeland Security and the Director of the GW Cybersecurity Initiative. She has worked in the Intelligence Community for 30 years, and served as the Deputy Associate Director for Policy at the National Security Agency. ...

Bear in mind, when considering the relationship between Silicon Valley and Israel, this is not Detroit versus Tokyo. It’s not that sort of nationalistic, zero-sum rivalry. It’s an additive relationship – one that is emerging as an instructive, vitally important transnational model for developing and selling new, transformative technologies. This ...

People are the weakest link in any cybersecurity system.  Conversations about the cyber issue typically focus on systems, the primary targets of hackers and cyber criminals, as opposed to the people using them. Hackers can always count on the “human factor”— whether it’s an innocent mistake or calculated malfeasance—to help ...

Lillian Ablon is a cybersecurity researcher at the RAND Corporation. She spoke with The Cipher Brief about the threat posed by social engineering, and the critical vulnerability posed by unwary individuals within an organization. The Cipher Brief: Some of our readers may not be familiar with the concept of social ...

Information security has a problem; an awkward border that we have consistently failed to understand and protect. This constantly changing, infinitely variable border is known as our people. Globally, we are spending millions of dollars addressing human centric information security, from training videos and e-learning to audit and accountability software. ...

Mitch Silber is the Senior Managing Director at FTI Consulting, a global business advisory firm.  He spoke with the Cipher Brief about the threat posed by malicious insiders – people within an organization who abuse their network access to harm their employers. The Cipher Brief: How would you characterize the ...

Heroes in war movies rally the troops by pronouncing: failure is not an option. Heroes at the forefront of cybersecurity know better: failure is practically unavoidable.   To protect businesses, the new name of the game is visibility. Monitor your computing environment, recover from attacks quickly, and learn from breaches so ...

The ability of a business to respond with speed and agility after the discovery of a significant cyberattack is critical to its overall recovery and resilience. While the seriousness of cyber threats is becoming better understood, including at the Board of Directors and C-Suite levels, there is still a perception ...

Josh Lefkowitz is the CEO of Flashpoint, a cyber threat intelligence firm that specializes in providing insights from the Deep and Dark Webs. Josh spoke with The Cipher Brief to discuss how the cyber threat environment is changing, and how companies can leverage threat intelligence to improve their overall security. ...

Heroes in war movies rally the troops by pronouncing: failure is not an option. Heroes at the forefront of cybersecurity know better: failure is practically unavoidable.   To protect businesses, the new name of the game is visibility. Monitor your computing environment, recover from attacks quickly, and learn from breaches so ...

The Cipher Brief spoke with Raj De to discuss the Cybersecurity Information Sharing Act (CISA). Mr. De recently served as the General Counsel at the National Security Agency, after holding senior appointments in the White House and the Department of Justice.  He is currently a partner at Mayer Brown, where ...

Cybercriminals are now using more advanced methods, once the exclusive domain of the state, to steal and profit from personal and proprietary information, blurring the line between cybercrime and cyberespionage. Companies who fail to adapt their cyber defenses to match this upgraded threat will be bringing a knife to a ...

Seemingly a typical teen living in the Virginia suburbs of the nation’s capital, Ali Shukri Amin, 17, led a different life online as curator of a pro-ISIS twitter account. Last week, Amin pled guilty in federal court to providing material support to ISIS. This case, and others like the shootout in Dallas or the ...