Latest
Big ideas, bold solutions. Explore the latest research, analysis, and policy insights from our experts.
The Problems with Seeking and Avoiding True Attribution to Cyber Attacks
Attribution to cyber attacks means different things to different audiences. In some cases analysts only care about grouping multiple intrusi
The Encryption Wars and Privacy Shield
Former NSA and CIA director Michael Hayden joins The Cybersecurity Podcast to talk about his new book, “Playing to the Edge.”
No, Norse is Not a Bellwether of the Threat Intel Industry but Does Hold Lessons Learned
Brian Krebs published an outstanding report today titled “Sources: Security Firm Norse Corp. Imploding” which has led to the emergence of a
Context for the Claim of a Cyber Attack on the Israeli Electric Grid
Dr. Yuval Steinitz, the Minister of National Infrastructure, Energy, and Water resources, announced today at the CyberTech Conference in Tel
Hack the Toaster, Cyber National Guard & Why L0pht Didn’t Shutter the Internet
Why the L0pht hacking collective didn’t want to shut down the Internet, and emerging unconventional cyberthreats.
Facts, Hype, and Takeaways from Reports on Iranian Activity Against the Power Grid and a Dam
Yesterday a report on Iranian activity focused on a small dam in New York was released by Danny Yadron at the Wall Street Journal. Today a r
Minimum Viable Products are Dubious in Critical Infrastructure
Minimum Viable Products in the critical infrastructure community are increasingly just mislabeled BETA tests; that needs to be communicated