Innovation Beyond Silicon Valley

by Bob Stratton

Whenever people think about cybersecurity, technology, and innovation, they tend to think about Silicon Valley, but The Cipher Brief asked Bob Stratton, a General Partner at MACH37™, what other...

Trade Secret Theft Trends: A Closer Look at the Perpetrators

by Sarah Morningstar

American businesses lose an estimated $160 billion to $480 billion annually due to trade secret misappropriation. To combat this loss, over the past few years the law enforcement community has...

Divergent Growth in Africa

by Ayso Van Eysinga

Downward growth revisions for Sub-Saharan Africa over the past year have tended to highlight the continued impact of external stimuli on the sub-region. The IMF’s latest revision cut growth...

The New Frontier in Terror Fundraising: Bitcoin

by Yaya Fanusie

When I worked as a counterterrorism analyst for the CIA, I always looked out for signs of terrorist groups adapting their methods. Now, as someone outside of government who analyzes how nefarious...

Is the Least Educated Employee Your Weakest Link?

by Robert Kandra

Given the growth of the cyber-threat matrix, many IT system users have found that conventional defenses—firewalls, anti-virus applications, blocking software, and malware detection regimes—are...

Keeping Your Mobile Phone Secure

by Ravi Devireddy

Trying to keep malware off your computer is standard practice at this point, but not many people know that malware also poses a threat to their phones. The Cipher Brief asked Ravi Devireddy, CTO and...

Navigating West Africa’s Worsening Security Climate

by Jesper Cullen

The threat of terrorism in West Africa appears to be growing, creating concerns about whether it is safe to do business there. The Risk Advisory Group – a global risk management consultancy – is...

The Threats are Here Today: Vulnerabilities in Industrial Control Systems

by Angie Messer

Industrial control systems (ICS) underlie a vast number of different processes, from manufacturing to energy production to public transit. As these systems become more advanced and more connected,...

The Effectiveness of Bug Bounty Programs

by Michael Taylor

As hackers continue to grow more sophisticated, many firms are struggling to find ways to ensure that their systems are secure. In support of that goal, some have found a measure of success with bug...

Networked Medical Devices at Risk

by Kurt Roemer

Networked medical devices are becoming steadily more common, and they are making things easier for both patients and healthcare providers. However, there is an accompanying risk of attack from...