The F-35, UK, and Coalition Operations: Capable, But Flawed

by Justin Bronk

The F-35 will bring two important capabilities, which are currently not possessed by the UK armed forces, when it enters frontline service at the end of this decade. The first is the capability to...

OPEC Is Back in the Driver's Seat — For Now

by Edward Morse

Saudi Arabia’s decision at the informal gathering of OPEC countries in Algeria on September 28th to reverse course and agree to participate in a production cut took markets by surprise. It...

The Future of Hypersonic Weapons

by Daniel M. Norton

Over the next few years, the Defense Advanced Research Projects Agency (DARPA) plans to demonstrate two air-launched hypersonic weapons (HSW) concepts; the Turbo Boost Glide and the Hypersonic...

The Likely Impact of New Guidelines on Corporate Cybersecurity

by Toni Hipp

Recent amendments to the Wassenaar Arrangement (WA)—a multilateral voluntary agreement among 41 countries that places restrictions on the export of dual use technologies—have added intrusion...

Innovation Beyond Silicon Valley

by Bob Stratton

Whenever people think about cybersecurity, technology, and innovation, they tend to think about Silicon Valley, but The Cipher Brief asked Bob Stratton, a General Partner at MACH37™, what other...

Trade Secret Theft Trends: A Closer Look at the Perpetrators

by Sarah Morningstar

American businesses lose an estimated $160 billion to $480 billion annually due to trade secret misappropriation. To combat this loss, over the past few years the law enforcement community has...

Divergent Growth in Africa

by Ayso Van Eysinga

Downward growth revisions for Sub-Saharan Africa over the past year have tended to highlight the continued impact of external stimuli on the sub-region. The IMF’s latest revision cut growth...

The New Frontier in Terror Fundraising: Bitcoin

by Yaya Fanusie

When I worked as a counterterrorism analyst for the CIA, I always looked out for signs of terrorist groups adapting their methods. Now, as someone outside of government who analyzes how nefarious...

Is the Least Educated Employee Your Weakest Link?

by Robert Kandra

Given the growth of the cyber-threat matrix, many IT system users have found that conventional defenses—firewalls, anti-virus applications, blocking software, and malware detection regimes—are...

Keeping Your Mobile Phone Secure

by Ravi Devireddy

Trying to keep malware off your computer is standard practice at this point, but not many people know that malware also poses a threat to their phones. The Cipher Brief asked Ravi Devireddy, CTO and...