Brad D. Williams
Reporter, Cyber and Networks, Breaking Defense
Brad D. Williams covers cyber, networks, and emerging tech. He has worked as a journalist and tech writer for 20 years, much of that time focusing on cybersecurity. He began his career on the night desk at a daily newspaper and then spent a decade as a senior tech writer in security operations centers, on cyber red teams, and embedded with engineers building tech for the public and private sectors. In 2015, Brad started a business specializing in cybersecurity content strategy and development. He joined Fifth Domain: Cyber at the publication’s launch in 2017 and developed an enterprise beat covering cybersecurity strategy, policy, operations, and emerging tech. Brad holds a master's degree in English and technical cybersecurity certification. Outside of work, Brad is a member of the United States Chess Federation and writes literature. bwilliams@breakingmedia.comStories by Brad D. Williams
“This direct call for physical mobilization is a significant development compared to prior activity, potentially indicative of an emerging intent to motivate real-world activity outside of China’s territories,” Mandiant researchers noted.
By Brad D. Williams
“A comprehensive strategic approach will take time, dedicated attention, and resources,” DoD official Gregory Kausner said.
By Brad D. Williams
“Our findings expose gaps between Chinese and Russian aspirations and the reality on the ground, bringing greater accuracy and nuance to current assessments of Sino-Russian cooperation,” on AI, notes a new report by the Center for Security and Emerging Technology.
By Brad D. Williams
“If there’s one overarching theme of our approach this year, it’s to transform where we’re heading and focus on technology and innovation and how to start using that better,” HASC Chair Smith said in opening remarks.
By Brad D. Williams
The law’s vulnerability disclosure provisions will give the Chinese government a head start on remediating — and potentially exploiting — zero-day vulnerabilities, possibly to include those discovered in tech used by the Defense Department, Intelligence Community, and across the US public and private sectors more broadly.
By Brad D. Williams
The RFP comes as the Army is undertaking a major, multi-year network modernization initiative.
By Brad D. Williams
Notably, the committee chair’s markup calls for private sector engagement in developing new cyber threat sharing capabilities.
By Brad D. Williams
The new office is slated for October, Pentagon CIO John Sherman said, while also giving updates on the Spectrum Strategy implementation plan and the cyber workforce strategy.
By Brad D. Williams
The Taliban now faces a decision: Ban the internet as the group did during its first rule, while hindering its propaganda windfall and other online activities, or leave the country’s networks intact, allowing an avenue for continued US electronic surveillance.
By Brad D. Williams
The contract award is the first phase in the DoD’s Rapid Assured Microelectronics Prototypes – Commercial (RAMP-C) program, which is intended to bolster US-based commercial foundries.
By Brad D. Williams
“Having an exquisite solution is really exciting, but if it takes 10 years to bring to bear for the warfighter, and it’s limited to only a few platforms, it’s much less compelling,” Northrop’s Ian Reynolds observed.
By Brad D. Williams
The space rush will result in tens of thousands of new assets launched within the decade, which will create a “truly enormous” cyber attack surface, said Sam Visner, a technical fellow at the MITRE Corporation.
By Brad D. Williams
“NGLD-M will be the biggest material change in cryptographic key delivery in 20 years,” Michael Badger, product lead of COMSEC, said.
By Brad D. Williams
“Today’s EMS Superiority Strategy combined our electromagnetic warfare and spectrum equities for the first time ever,” said Vice Chairman John Hyten. “The Strategy’s I-Plan sets us on a path to dominate the future battle space. We are determined to get there and achieve spectrum superiority in all domains.”
By Brad D. Williams
“This direct call for physical mobilization is a significant development compared to prior activity, potentially indicative of an emerging intent to motivate real-world activity outside of China’s territories,” Mandiant researchers noted.
By Brad D. Williams“A comprehensive strategic approach will take time, dedicated attention, and resources,” DoD official Gregory Kausner said.
By Brad D. Williams“Our findings expose gaps between Chinese and Russian aspirations and the reality on the ground, bringing greater accuracy and nuance to current assessments of Sino-Russian cooperation,” on AI, notes a new report by the Center for Security and Emerging Technology.
By Brad D. Williams“If there’s one overarching theme of our approach this year, it’s to transform where we’re heading and focus on technology and innovation and how to start using that better,” HASC Chair Smith said in opening remarks.
By Brad D. WilliamsThe law’s vulnerability disclosure provisions will give the Chinese government a head start on remediating — and potentially exploiting — zero-day vulnerabilities, possibly to include those discovered in tech used by the Defense Department, Intelligence Community, and across the US public and private sectors more broadly.
By Brad D. WilliamsThe RFP comes as the Army is undertaking a major, multi-year network modernization initiative.
By Brad D. WilliamsNotably, the committee chair’s markup calls for private sector engagement in developing new cyber threat sharing capabilities.
By Brad D. WilliamsThe new office is slated for October, Pentagon CIO John Sherman said, while also giving updates on the Spectrum Strategy implementation plan and the cyber workforce strategy.
By Brad D. WilliamsThe Taliban now faces a decision: Ban the internet as the group did during its first rule, while hindering its propaganda windfall and other online activities, or leave the country’s networks intact, allowing an avenue for continued US electronic surveillance.
By Brad D. WilliamsThe contract award is the first phase in the DoD’s Rapid Assured Microelectronics Prototypes – Commercial (RAMP-C) program, which is intended to bolster US-based commercial foundries.
By Brad D. Williams“Having an exquisite solution is really exciting, but if it takes 10 years to bring to bear for the warfighter, and it’s limited to only a few platforms, it’s much less compelling,” Northrop’s Ian Reynolds observed.
By Brad D. WilliamsThe space rush will result in tens of thousands of new assets launched within the decade, which will create a “truly enormous” cyber attack surface, said Sam Visner, a technical fellow at the MITRE Corporation.
By Brad D. Williams“NGLD-M will be the biggest material change in cryptographic key delivery in 20 years,” Michael Badger, product lead of COMSEC, said.
By Brad D. Williams“Today’s EMS Superiority Strategy combined our electromagnetic warfare and spectrum equities for the first time ever,” said Vice Chairman John Hyten. “The Strategy’s I-Plan sets us on a path to dominate the future battle space. We are determined to get there and achieve spectrum superiority in all domains.”
By Brad D. Williams