Tag: conferences

Program code on dark background (selective focus)

Podcast: Michael Daniel on Cyber Diplomacy in the Age of Trump

In-brief: In an interview with The Security Ledger, former Obama Cybersecurity Advisor Michael Daniel weighs in on the changing US-Israel relationship, promoting cyber security talent in the U.S. and the future of the intelligence community’s ‘vulnerability equities’ program. 

Reports linking the Petya malware attacks to Russia-backed hackers may be an early test of a muscular Trump cyber doctrine.

Petya Malware may be an Early Test of Muscular Trump Cyber Doctrine

In-brief: In the hours before the Petya malware began circulating, two high level Trump Administration officials called for a tougher stand against online actors who sow chaos. The question now is how the Administration will react.

A statue of the Trojan Horse adorns the campus at Tel Aviv University, where some of the world's top cyber security professionals are trained.

At Conference: Israel Preaches Peace through Cyber Strength

In-brief: Five years into a major overhaul, the Israeli government is celebrating its status as the go-to country for cyber security know-how and promoting its own recipe for success to other countries. But how many of them can or will follow suit?  

Hungry for Cyber Warriors, Military Weighs Image, Lifestyle Changes

Hungry for Cyber Warriors, Military Weighs Image, Lifestyle Changes

In brief: As cyber threats increase, the U.S. military is considering big changes to attract and retain talent, from loosening standards on grooming to shorter, mission-based deployments.

Dmitri Alperovitch of Crowdstrike talks with Security Ledger Editor Paul Roberts.

Podcast: Dmitri Alperovitch on Russian hacking and the future of cyber conflict

In-brief: In this Security Ledger Podcast, Editor in Chief Paul Roberts speaks with Dmitri Alperovitch about the latest trends in sophisticated cyber attacks, and how Russia’s hacking of the U.S. election and weaponization of stolen information is likely to influence the U.S. government’s response to future hacks – responses that might not take place in cyber space.