Skip to content
Search

Latest Stories

cipherbrief

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Tech/Cyber

Why Are There No U.S. Offensive Cyber Unicorns?

OPINION -- I recently had a conversation with senior intelligence community leaders about their desire to build stronger partnerships with [...] More

The Latest

AI-Powered Adversaries Require AI-Driven Defenses

OPINION — The use of artificial intelligence by adversaries has been the subject of exhaustive speculation. No one doubts that the technology will be [...] More

The Hidden National Security Risk in Smart Cities

OPINION — It is worryingly easy to get hold of personal and sensitive data on American military and intelligence personnel. Earlier this year [...] More

Forget Guerrillas and IEDs - The Next Asymmetric War Will Be Engineered

OPINION — For most of modern history, asymmetric conflict conjured a familiar image: guerrillas in the hills, insurgents planting roadside bombs, or [...] More

National Cyber Defenses at Risk as Key Programs Expire Amid Government Shutdown

OPINION — Ransomware attacks conducted by criminals are persistently hitting airports, schools, and 911 dispatch centers, while foreign adversaries [...] More

Lawmakers ‘Bullseye and Bait’ in AI-Driven Deepfake Campaigns

OPINION — Elected officials are both the bullseye and the bait for AI-driven influence campaigns launched by foreign adversaries. They are targeted [...] More

Telecom Bust Near the UN Reveals New National Security Vulnerability

Telecom Bust Near the UN Reveals New National Security Vulnerability

DEEP DIVE — When Secret Service agents swept into an inconspicuous building near the United Nations General Assembly late last month, they weren’t [...] More

The Hidden Leverage of Digital Chokepoints

EXPERT PERSPECTIVE — When we think about the arteries of global power, images of oil pipelines or shipping lanes often come to mind. They are [...] More

Former U.S. Cyber Chief: Crowdsource Cyber Defense

EXPERT INTERVIEW — Riyadh’s Global Cybersecurity Forum (GCF) in Saudi Arabia kicked off last week under the theme “Scaling Cohesive Advancement in [...] More

Special Report: Nat Sec EDGE 2025

Special Report: Nat Sec EDGE 2025

The Cipher Brief's Special Report on Nat Sec EDGE 2025The Nat Sec EDGE 2025 conference took place June 5–6, 2025 in Austin, Texas.ForewordThe 2025 [...] More

Ukraine’s Great Cyber Heist

Ukraine’s Great Cyber Heist

DEEP DIVE -- For more than a decade, Moscow honed a shadow playbook — blending disinformation, ransomware, supply-chain sabotage, and quiet cyber [...] More

As Cyber Threats Grow, the Clock Ticks on a Critical Cybersecurity Law

As Cyber Threats Grow, the Clock Ticks on a Critical Cybersecurity Law

DEEP DIVE – The onslaught of cyberattacks against the U.S. and U.S. businesses has not let up and the clock is ticking on reauthorizing a new bill [...] More