Is This the Beginning of the End of “Duel”-track Foreign Policy?
by Andrea Little LimbagoThe Iranian nuclear negotiations occupy a persistent spot in the foreign policy news cycle. The Associated Press recently reported that Iran has agreed to a list of nuclear...
View ArticleBlurred Lines: Dispelling the False Dichotomy between National & Corporate...
by Andrea Little Limbago and Cody PierceSeveral US government agencies have experienced targeted cyber attacks over the last few months. Many believe China is responsible for cyber attacks on the...
View ArticleUnderstanding Crawl Data at Scale (Part 1)
by John MunroA couple of years ago, in an effort to better understand technology trends, we initiated a project to identify typical web site characteristics for various geographic regions. We wanted to...
View ArticleThe Fog of (Cyber) War: The Attribution Problem and Jus ad Bellum
by Andrea Little LimbagoThe Sony Pictures Classics film The Fog of War is a comprehensive and seemingly unfiltered examination of former Secretary of Defense Robert McNamara, highlighting the key...
View ArticleThe Year Ahead in Cyber: Endgame Perspectives on 2015
From the first CEO of a major corporation resigning in the wake of a cyber attack, to NATO incorporating the cyber realm into Article 5, to the still fresh-in-our-minds Sony attack, 2014 was certainly...
View ArticleCould a Hollywood Breach and Some Tweets Be the Tipping Point for New Cyber...
by Andrea Little LimbagoTwo months ago, near-peer cyber competitors breached numerous government systems. During this same time, China debuted its new J-31 stealth fighter jet, which has components...
View ArticleUnderstanding Crawl Data at Scale (Part 2)
by Richard XieEffective analysis of cyber security data requires understanding the composition of networks and the ability to profile the hosts within them according to the large variety of features...
View ArticleUnderstanding Crawl Data at Scale (Part 3)
by Richard XieIn Understanding Crawl Data at Scale (Part 2), I demonstrated using SOM to visualize a high-dimensional dataset and use the technique to help reduce the dimensionality. As you may...
View ArticleA Martian's Take on Cyber in the National Security Strategy
by Andrea Little LimbagoIn the recent New York Times bestselling book, The Martian, Andy Weir depicts a future world where space travel to Mars is feasible. Through an unfortunate string of events, the...
View ArticleFive Thoughts from the White House Summit on Cybersecurity and Consumer...
by Nate FickThe Obama Administration deserves credit for putting together the first-ever White House summit on cybersecurity on Friday and – contrary to what some media coverage may lead you to believe...
View ArticleStreaming Data Processing with PySpark Streaming
by Rich SeymourStreaming data processing has existed in our computing lexicon for at least 50 years. The ideas Doug McIlroy presented in 1964 regarding what would become UNIX pipes have been revisited,...
View ArticleRepression Technology: An Authoritarian Whole of Government Approach to...
by Andrea Little LimbagoLast week, as discussions of striped dresses and llamas dominated the headlines, academia and policy coalesced in a way that rarely happens. On February 25th, Director of...
View ArticleHacking the Glass Ceiling
Niloofar Razi HoweAs we approach International Women’s Day this week and edge closer to the 100th anniversary of women’s suffrage (okay, four years to go, but still, a remarkable moment), and as news...
View ArticleEndgame Lands FireEye Chief Architect to Head Research Team
Endgame Lands FireEye Chief Architect to Head Research TeamA pioneer in adversary intelligence, James Butler brings unparalleled experience and innovation to Endgame’s cyber threat detection and...
View Article