Skip to content
Search

Latest Stories

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Obstacles to Information Sharing in the Virtual Battlefield

Statecraft and business have always been closely linked, but the advent of digital technology has blurred the roles more than ever. Systems crucial to the economic well-being and national security of the United States rest in the hands of private companies. The two sectors must cooperate by sharing information at an immense pace and scale to keep up with the threat of cyber attacks. The Cipher Brief’s Levi Maxey spoke with James Clapper, the former U.S. Director of National Intelligence, about how the U.S. approaches cybersecurity information sharing and why there continues to be obstacles for both government and private sector when sharing data on virtual risks with real world consequences.

The Cipher Brief: How would you characterize cooperation and information sharing between the intelligence community and major tech companies?

Keep reading...Show less
Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Related Articles

The Houthi Balancing Act After Israel’s Attack on Iran

OPINION — How will the Houthis respond to the devastating Israeli strikes on Iran? This moment could prove decisive for both the Iran-led axis and [...] More
The Attack that Knocked Back Iran’s Nuclear Program

The Attack that Knocked Back Iran’s Nuclear Program

EXPERT INTERVIEW — Israeli airstrikes against targets associated with Iran’s nuclear program early Friday have seemingly dealt a devastating blow as [...] More

Dead Drop: June 13

SHOULD GREENLAND AND PANAMA BE (EVEN MORE) NERVOUS: Defense Secretary Pete Hegseth was engaged in a war of words this week with lawmakers during a [...] More
Report for Friday, June 13, 2025

Report for Friday, June 13, 2025

9:07 AM America/New_York Friday, June 13 [...] More

China Wants Our Hearts. Literally.

OPINION — China is pre-positioning itself on U.S. networks for disruptive and destructive attacks against our critical infrastructure. In the past [...] More