The F-35, UK, and Coalition Operations: Capable, But Flawed
The F-35 will bring two important capabilities, which are currently not possessed by the UK armed forces, when it enters frontline service at the end […] More
The F-35 will bring two important capabilities, which are currently not possessed by the UK armed forces, when it enters frontline service at the end […] More
Saudi Arabia’s decision at the informal gathering of OPEC countries in Algeria on September 28th to reverse course and agree to participate in a production […] More
Over the next few years, the Defense Advanced Research Projects Agency (DARPA) plans to demonstrate two air-launched hypersonic weapons (HSW) concepts; the Turbo Boost Glide and the Hypersonic Air-breathing Weapons Concept. […] More
Recent amendments to the Wassenaar Arrangement (WA)—a multilateral voluntary agreement among 41 countries that places restrictions on the export of dual use technologies—have added intrusion […] More
Whenever people think about cybersecurity, technology, and innovation, they tend to think about Silicon Valley, but The Cipher Brief asked Bob Stratton, a General Partner […] More
American businesses lose an estimated $160 billion to $480 billion annually due to trade secret misappropriation. To combat this loss, over the past few years […] More
Downward growth revisions for Sub-Saharan Africa over the past year have tended to highlight the continued impact of external stimuli on the sub-region. The IMF’s […] More
When I worked as a counterterrorism analyst for the CIA, I always looked out for signs of terrorist groups adapting their methods. Now, as someone […] More
Given the growth of the cyber-threat matrix, many IT system users have found that conventional defenses—firewalls, anti-virus applications, blocking software, and malware detection regimes—are only […] More
Trying to keep malware off your computer is standard practice at this point, but not many people know that malware also poses a threat to […] More
The threat of terrorism in West Africa appears to be growing, creating concerns about whether it is safe to do business there. The Risk Advisory […] More
Industrial control systems (ICS) underlie a vast number of different processes, from manufacturing to energy production to public transit. As these systems become more advanced […] More
As hackers continue to grow more sophisticated, many firms are struggling to find ways to ensure that their systems are secure. In support of that […] More
Networked medical devices are becoming steadily more common, and they are making things easier for both patients and healthcare providers. However, there is an accompanying […] More
In January, the CEO of American Superconductor publicly detailed how traditional economic espionage methods carried out by a small Chinese firm resulted in over a […] More
The “consumerization of IT,” a term coined in the early 2000s with origins dating back to the introduction of the personal computer, continues to be […] More
Stranded during a historic Washington-area blizzard in February 2010, a U.S. soldier embarked on a mission that he had sworn to not fulfill: “…I joined […] More
On March 11, President Barack Obama said that smartphones can’t be allowed to be “black boxes,” inaccessible to the government. It is apparent that the […] More
Search