Skip to content
Search

Latest Stories

cipherbrief

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Why Are There No U.S. Offensive Cyber Unicorns?

OPINION -- I recently had a conversation with senior intelligence community leaders about their desire to build stronger partnerships with private-sector technology companies—the so-called “Silicon Valley” ecosystem. They were asking for advice on how to engage, build relationships, and ultimately establish strategic partnerships.

But the companies they were most interested in? They were largely consumer-facing platforms. Innovative, yes—but not mission-aligned. That conversation highlighted a broader, more fundamental gap I’ve been thinking about for a long time: Why are there no U.S. offensive cyber unicorns?


We certainly have defense contractors who do cyber work—on site, on contract, embedded with the government. And we have standout cybersecurity companies like CrowdStrike, Mandiant, and Dragos focused on detection, response, and resilience. But where are the startups building offensive cyber tools and platforms? Where’s the VC-backed innovation model we’ve seen in drones, hypersonics, and space?

Save your virtual seat now for The Cyber Initiatives Group Winter Summit on December 10 from 12p – 3p ET for more conversations on cyber, AI and the future of national security.

Companies like Anduril and SpaceX have proven that Silicon Valley-style innovation—product-focused, capital-efficient, fast-moving—can thrive in the national security space. So why hasn’t that approach been applied to offensive cyber? Yes, there are legal and secrecy constraints. But those same constraints haven’t stopped commercial companies from building weapons systems or highly classified ISR platforms.

Take a look at the NatSec100 - a curated list of top defense and national security startups. You’ll find companies working on AI, autonomy, sensing, and cybersecurity. But not a single one focused on offensive cyber. Why not?

Shouldn’t we want the best minds at CrowdStrike or Mandiant to spin off and build next-generation offensive platforms? Shouldn’t the DOD and IC be seeding these ideas and building an ecosystem that encourages this kind of innovation?

I believe we should.

Follow Bryan on LinkedIn or right here at The Cipher Brief.

The Cipher Brief is committed to publishing a range of perspectives on national security issues submitted by deeply experienced national security professionals.

Opinions expressed are those of the author and do not represent the views or opinions of The Cipher Brief.

Have a perspective to share based on your experience in the national security field? Send it to Editor@thecipherbrief.com for publication consideration.

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

Related Articles

The Hidden National Security Risk in Smart Cities

OPINION — It is worryingly easy to get hold of personal and sensitive data on American military and intelligence personnel. Earlier this year [...] More

Forget Guerrillas and IEDs - The Next Asymmetric War Will Be Engineered

OPINION — For most of modern history, asymmetric conflict conjured a familiar image: guerrillas in the hills, insurgents planting roadside bombs, or [...] More

A Deniable Attack with Strategic Precision: Why the Red Hat Breach Looks More Like Statecraft Than Mere Crime

EXPERT PERSPECTIVE — The timing was no coincidence.As the U.S. federal government ground to a halt at 12:01 a.m. EDT on October 1, 2025, a [...] More

Lawmakers ‘Bullseye and Bait’ in AI-Driven Deepfake Campaigns

OPINION — Elected officials are both the bullseye and the bait for AI-driven influence campaigns launched by foreign adversaries. They are targeted [...] More

Former U.S. Cyber Chief: Crowdsource Cyber Defense

EXPERT INTERVIEW — Riyadh’s Global Cybersecurity Forum (GCF) in Saudi Arabia kicked off last week under the theme “Scaling Cohesive Advancement in [...] More

Ukraine’s Great Cyber Heist

Ukraine’s Great Cyber Heist

DEEP DIVE -- For more than a decade, Moscow honed a shadow playbook — blending disinformation, ransomware, supply-chain sabotage, and quiet cyber [...] More

{{}}