China Pivots its Hackers from Industrial Spies to Cyber Warriors
China continues to deploy military equipment to contested islands in the South China Sea, raising concerns among regional players and U.S. forces stationed in the […] More
China continues to deploy military equipment to contested islands in the South China Sea, raising concerns among regional players and U.S. forces stationed in the […] More
In September 2015, Chinese President Xi Jinping and President Barack Obama reached an agreement that neither nation would “conduct or knowingly support cyber-enabled theft of […] More
Connectivity continues to enmesh businesses, governments, societies and people – a trend that will only accelerate with the growth of public cloud services and devices […] More
In the world of network security, the term air gap refers to a situation in which the computer network is physically separated from other networks, […] More
My late mother served as a sergeant in the Women’s Army Corps during World War II. She was nearly killed in 1944 by a “buzz […] More
As the House Intelligence Committee gathers on Monday to hold its first public hearing into Russian interference in the 2016 election, experts say this marks […] More
The controversy surrounding alleged Russian interference in the 2016 Presidential election shows no sign of waning, dominating the conversation during The Cipher Brief’s Georgetown Salon […] More
The drumbeat of cyber incidents continues unabated, with breaches at email providers, insurance companies, defense contactors, telecoms, adult websites, government databases, and so much more. […] More
WikiLeaks on Tuesday published what it claims to be the CIA’s hacking techniques to exploit devices such as smart phones, computers, and Internet-connected televisions for […] More
Cyberspace is often portrayed as a new domain of international relations – a Wild West where there are no rules or guiding principles to govern […] More
NATO’s Cooperative Cyber Defence Centre of Excellence last month published the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, a follow-on project […] More
A group of international law experts met in Tallinn, Estonia, after the 2007 onslaught of cyber attacks against sites in the country, to create the […] More
Cyber operations remain at the forefront of confrontations between the West and Moscow as relations continue to deteriorate. Russia asserted itself in 2007 with “patriotic […] More
Understanding the Russian criminal underground is essential when discussing Russian proxies in cyberspace. How do cybercriminal entities interact with each other and what is their […] More
What if network defenders knew that a cyber operation occurred during Moscow business hours, that it involved a Russian IP address, and that the cyber […] More
For many, cybersecurity is a technical problem and therefore requires technical solutions. But for policymakers and the national security community, a key takeaway from this […] More
This week I am attending the RSA Conference, a global convention bringing together government and business approaches to secure the digital channels people depend on […] More
The cybersecurity industry, much like other sectors, is dealing with an influx of data. In response, security experts hope to harness the power of artificial […] More
Search