Developing Cyber Literacy in the Workforce

by Rhea Siers

Every day we read another report lamenting the limited workforce that possesses the technical skills so badly needed in cybersecurity.  This is a significant challenge for our educational system to...

Countering Drones

by Rachel Stohl

The Unmanned Aerial Vehicle (UAV) industry is growing rapidly, and this is causing some concern about individuals using UAVs for illicit purposes. The Cipher Brief spoke to Rachel Stohl, of the...

How One Bad Apple Case Could Hurt

by Chris Finan

The court order demanding Apple create an encryption-breaking tool was never about a single iPhone.  A disclosure in a federal court yesterday revealed that the Justice Department has made at least...

The Cyber Campaigns

by Chris Drake

Cybersecurity legislation was a major component of President Barack Obama’s 2015 State of the Union Address, soon followed by the introduction and approval of the Cybersecurity Information Sharing...

What Business Can Learn from the NFL

by Jeremy King

With the Super Bowl just completed, corporate America might take this as a good time to step back and reevaluate how strong its offensive and defensive capabilities really are. With the economy...

Transforming Defense Acquisition

by Joseph Pasqua

Three decades ago, The Blue Ribbon Commission on Defense Management (colloquially known as the Packard Commission after its Chairman David Packard) published A Quest for Excellence, its seminal study...

The New Battleground

by Chris Finan

Between the campaign trail and Washington, DC, Americans are hearing that Silicon Valley must do more to combat terrorist propaganda on social media.  From Donald Trump’s call to “close that...