A recent October 22, 2025 article revealed that the Cybersecurity and Infrastructure Security Agency (CISA) will be laying off nearly all of its 95 employees within the Stakeholder Engagement Division (SED), effectively dismantling three of ...
							Analysis
						 
												
											
				
					
						
							
							
Law Firms Are Prime Targets for APT
When the suspected nation state hackers came for Williams & Connolly, they didn’t do it with a crowbar and a ransom note. They slipped through an unpatched crease in ...
							Analysis
						 
												
											
				
					
						
							
							
The Cybersecurity Information Sharing Act (CISA) of 2015 has been the bedrock of the U.S. government’s formal mechanism for sharing cyber threat information with the private sector. As its sunset clause approaches (September 30, 2025), it’s not ...
							Analysis
						 
												
											
				
					
						
							
							
Cognitive Warfare in Cyberspace: A Brief Look at China, Russia, and the United States
Cognitive warfare has emerged as one of the most significant dimensions of modern conflict.  Unlike traditional military operations aimed at seizing territory ...
							Analysis
						 
												
											
				
					
						
							
							Google appears poised to engage in more proactive cyber operations to defend its interests, as well as other American entities, from hostile threat actors. 
							Analysis
						 
												
											
				
					
						
							
							
What Does Restructuring State’s Cyber Program Mean for the U.S.’ Cyber Plan?
Recently, the United States’ Department of State restructured its Bureau of Cyberspace and Digital Policy (CDP), letting go of some senior officials and restructuring ...
							Analysis
						 
												
											
				
					
						
							
							
Recently, a joint European-led operation combining the efforts of several law enforcement agencies successfully disrupted the activities of a pro-Russian hacktivist group known as NoName057(16).  Dubbed “Operation Eastwood” the collaboration proved highly effective in degrading ...
							Analysis
						 
												
											
				
					
						
							
							The advent of artificial intelligence has correctly ushered in concerns over its abuse by hostile threat actors to leverage the technology to enhance the speed of their attacks and further advance the efficacy of their ...
							Analysis
						 
												
											
				
					
						
							
							
A recent article intimated that the United States has taken a step back from addressing foreign influence and interference in cyberspace, raising the question if the United States and by extension the West has limited its capabilities ...
							Analysis
						 
												
											
				
					
						
							
							
Recent news reporting indicates that Chinese-sponsored cyber espionage threat actors have been conducting operations against Russia in an attempt to collect sensitive military and defense systems since the Ukraine war began.  Researchersfrom a Taiwan cybersecurity company these incursions ...
							Analysis