Examining the US Cyber Budget
June 15 2020Jason Healey takes a detailed look at the US federal cybersecurity budget and reaches an important conclusion: the US keeps saying that we need to prioritize defense, but in...
Read moreJason Healey takes a detailed look at the US federal cybersecurity budget and reaches an important conclusion: the US keeps saying that we need to prioritize defense, but in...
Read moreI just published a new paper with Karen Levy of Cornell: "Privacy Threats in Intimate Relationships." Abstract: This article provides an overview of intimate threats: a class of privacy...
Read moreBen Buchanan has written "A National Security Research Agenda for Cybersecurity and Artificial Intelligence." It's really good -- well worth reading....
Read moreOn June 21, 2016, FireEye’s Dynamic Threat Intelligence (DTI) identified an increase in JavaScript contained within spam emails. FireEye analysts determined the increase was the result of...
Read moreOn June 21, 2016, FireEye’s Dynamic Threat Intelligence (DTI) identified an increase in JavaScript contained within spam emails. FireEye analysts determined the increase was the result of...
Read moreOn June 21, 2016, FireEye’s Dynamic Threat Intelligence (DTI) identified an increase in JavaScript contained within spam emails. FireEye analysts determined the increase was the result of...
Read moreOn June 21, 2016, FireEye’s Dynamic Threat Intelligence (DTI) identified an increase in JavaScript contained within spam emails. FireEye analysts determined the increase was the result of...
Read moreThe term "critical infrastructure" has earned its spot on the board of our ongoing game of cyber bingo--right next to "Digital...
Read moreThe term "critical infrastructure" has earned its spot on the board of our ongoing game of cyber bingo--right next to "Digital...
Read moreThe term "critical infrastructure" has earned its spot on the board of our ongoing game of cyber bingo--right next to "Digital...
Read more
Recent Comments