You are here
Latest Private Sector Columns
The Cipher Brief connects with the private industry on research and innovation that addresses emerging global security issues.
Mitigating Harm from a Breach of Internet-Connected Devices
by Colin McKinty
The Internet of Things (IoT), a phenomenon of everyday Internet-connected devices ranging from smart appliances to webcams and routers, is making the lives of companies, governments, and households...
Cybersecurity: The Difficulty of Staying One Step Ahead of the Bad Guys
by Tammy Moskites
The cybersecurity environment is constantly changing. The Cipher Brief spoke with Tammy Moskites, Chief Information Officer at the cybersecurity firm Venafi, who says cybersecurity...
Company Systems Vulnerable to Mobile Devices
by Michael Covington
With the pervasive growth of smart phone and tablet use, cybersecurity professionals are worried these devices could present new vulnerabilities to company systems. The Cipher Brief spoke with...
Offensive Security Has Value
by Guy Bejerano
With organizations and companies continuing to experience breaches in their networks, there is a need for the cybersecurity industry to quickly adapt their strategies so that they are inspecting the...
The F-35, UK, and Coalition Operations: Capable, But Flawed
by Justin Bronk
The F-35 will bring two important capabilities, which are currently not possessed by the UK armed forces, when it enters frontline service at the end of this decade. The first is the capability to...
OPEC Is Back in the Driver's Seat — For Now
by Edward Morse
Saudi Arabia’s decision at the informal gathering of OPEC countries in Algeria on September 28th to reverse course and agree to participate in a production cut took markets by surprise. It...
The Future of Hypersonic Weapons
by Daniel M. Norton
Over the next few years, the Defense Advanced Research Projects Agency (DARPA) plans to demonstrate two air-launched hypersonic weapons (HSW) concepts; the Turbo Boost Glide and...
The Likely Impact of New Guidelines on Corporate Cybersecurity
by Toni Hipp
Recent amendments to the Wassenaar Arrangement (WA)—a multilateral voluntary agreement among 41 countries that places restrictions on the export of dual use technologies—have added intrusion software...
Innovation Beyond Silicon Valley
by Bob Stratton
Whenever people think about cybersecurity, technology, and innovation, they tend to think about Silicon Valley, but The Cipher Brief asked Bob Stratton, a General Partner at MACH37™, what other...