Counterintelligence for U.S. Companies Operating Abroad

by Sarah Morningstar

In January, the CEO of American Superconductor publicly detailed how traditional economic espionage methods carried out by a small Chinese firm resulted in over a billion dollars in loss to his...

Shadow IT & Cloud Access Controls

by Doug Cahill

The “consumerization of IT,” a term coined in the early 2000s with origins dating back to the introduction of the personal computer, continues to be manifested in corporate computing in a...

Insider Threats: A Big Data Problem for Big Defense

by Jonathan Berliner

Stranded during a historic Washington-area blizzard in February 2010, a U.S. soldier embarked on a mission that he had sworn to not fulfill: “…I joined in on an IRC (Internet Relay Chat)...

Government vs. the Evolution of Encryption

by Dan Kruger

On March 11, President Barack Obama said that smartphones can’t be allowed to be “black boxes,” inaccessible to the government.  It is apparent that the government does not understand...

Government vs. the Evolution of Encryption

by Dan Kruger

This is Cipher Brief Level I Member Only content. It can be accessed via login or by signing up to become a Cipher Brief Member.  Joining this high-level, security-focused community is only...

Endpoint Security Management

by Doug Cahill

Do you bring your own laptop to the office, or does your phone connect to your company’s Wi-Fi network? If so, then you need to be concerned about endpoint security. The rise of...

Developing Cyber Literacy in the Workforce

by Rhea Siers

Every day we read another report lamenting the limited workforce that possesses the technical skills so badly needed in cybersecurity.  This is a significant challenge for our educational system to...

Countering Drones

by Rachel Stohl

The Unmanned Aerial Vehicle (UAV) industry is growing rapidly, and this is causing some concern about individuals using UAVs for illicit purposes. The Cipher Brief spoke to Rachel Stohl, of the...

How One Bad Apple Case Could Hurt

by Chris Finan

The court order demanding Apple create an encryption-breaking tool was never about a single iPhone.  A disclosure in a federal court yesterday revealed that the Justice Department has made at least...

The Cyber Campaigns

by Chris Drake

Cybersecurity legislation was a major component of President Barack Obama’s 2015 State of the Union Address, soon followed by the introduction and approval of the Cybersecurity Information Sharing...