News & Analysis

Leaving the Oil Spigot Open

On April 17, the thirteen members of OPEC (Organization of Petroleum Exporting Countries) and five other major producers met in Doha to negotiate a long-awaited […] More

Volatility in the Market

In November 2014, the thirteen members of the Organization for Petroleum Exporting Countries (OPEC) shocked oil markets by announcing that, in order to “restore market […] More

The Threat to Business

Bring-your-own-device culture is very convenient, but with a growing amount of malware targeting mobile devices, it is also creating new vulnerabilities. The Cipher Brief spoke […] More

An Evolving Battle

As malware continues to grow and change, the number and types of at-risk devices will do the same. Currently, malware oriented towards mobile devices is […] More

Experts Doubt Aleppo "Regime of Calm"

Strikes and continuous violence have strained the fresh Aleppo cease-fire the United States and Russia brokered this week, leaving experts doubtful any cessation of hostilities […] More

A Strategic Premium for China

China’s President Xi Jinping has committed himself to the country’s development as a maritime power and to protecting its sovereignty. One can reasonably assume that […] More

Beijing's Sovereignty Gamble

China’s neighbors are gravely concerned about what they see as a clear and determined strategy being implemented by Xi Jinping, the leader of the Chinese […] More

What Drives ISIS

Broadcasting brutal murder videos, enslaving religious minorities, training and deploying child soldiers, carrying out suicide bombings at crowded intersections – these are just some of […] More

The Islamist Ideology

Is ISIS Islamic?  Probably not.  Is it Islamist?  Definitely.  An Islamist is one who believes in a version of Islam which would impose a politicized […] More

Energy Security in the Americas

Latin American countries have a long history of swift regime change, either by coup or by legitimate institutional processes. The impetus is typically economic decline. […] More

Lessons to Learn

It is hard to miss the frightening headlines about car hacking scenarios.  But in reality, there’s more to automotive cyber security. Hackers may be individuals […] More

Search

Close