Mitigating Harm from a Breach of Internet-Connected Devices

by Colin McKinty

The Internet of Things (IoT), a phenomenon of everyday Internet-connected devices ranging from smart appliances to webcams and routers, is making the lives of companies, governments, and households...

Cybersecurity: The Difficulty of Staying One Step Ahead of the Bad Guys

by Tammy Moskites

The cybersecurity environment is constantly changing. The Cipher Brief spoke with Tammy Moskites,  Chief Information Officer at the cybersecurity firm Venafi, who says cybersecurity professionals...

Company Systems Vulnerable to Mobile Devices

by Michael Covington

With the pervasive growth of smart phone and tablet use, cybersecurity professionals are worried these devices could present new vulnerabilities to company systems. The Cipher Brief spoke with...

Offensive Security Has Value

by Guy Bejerano

With organizations and companies continuing to experience breaches in their networks, there is a need for the cybersecurity industry to quickly adapt their strategies so that they are inspecting the...

The F-35, UK, and Coalition Operations: Capable, But Flawed

by Justin Bronk

The F-35 will bring two important capabilities, which are currently not possessed by the UK armed forces, when it enters frontline service at the end of this decade. The first is the capability to...

OPEC Is Back in the Driver's Seat — For Now

by Edward Morse

Saudi Arabia’s decision at the informal gathering of OPEC countries in Algeria on September 28th to reverse course and agree to participate in a production cut took markets by surprise. It...

The Future of Hypersonic Weapons

by Daniel M. Norton

Over the next few years, the Defense Advanced Research Projects Agency (DARPA) plans to demonstrate two air-launched hypersonic weapons (HSW) concepts; the Turbo Boost Glide and the Hypersonic...

The Likely Impact of New Guidelines on Corporate Cybersecurity

by Toni Hipp

Recent amendments to the Wassenaar Arrangement (WA)—a multilateral voluntary agreement among 41 countries that places restrictions on the export of dual use technologies—have added intrusion...

Innovation Beyond Silicon Valley

by Bob Stratton

Whenever people think about cybersecurity, technology, and innovation, they tend to think about Silicon Valley, but The Cipher Brief asked Bob Stratton, a General Partner at MACH37™, what other...

Trade Secret Theft Trends: A Closer Look at the Perpetrators

by Sarah Morningstar

American businesses lose an estimated $160 billion to $480 billion annually due to trade secret misappropriation. To combat this loss, over the past few years the law enforcement community has...