Skip to content
Search

Latest Stories

cipherbrief

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Why Are There No U.S. Offensive Cyber Unicorns?

OPINION -- I recently had a conversation with senior intelligence community leaders about their desire to build stronger partnerships with private-sector technology companies—the so-called “Silicon Valley” ecosystem. They were asking for advice on how to engage, build relationships, and ultimately establish strategic partnerships.

But the companies they were most interested in? They were largely consumer-facing platforms. Innovative, yes—but not mission-aligned. That conversation highlighted a broader, more fundamental gap I’ve been thinking about for a long time: Why are there no U.S. offensive cyber unicorns?


We certainly have defense contractors who do cyber work—on site, on contract, embedded with the government. And we have standout cybersecurity companies like CrowdStrike, Mandiant, and Dragos focused on detection, response, and resilience. But where are the startups building offensive cyber tools and platforms? Where’s the VC-backed innovation model we’ve seen in drones, hypersonics, and space?

Save your virtual seat now for The Cyber Initiatives Group Winter Summit on December 10 from 12p – 3p ET for more conversations on cyber, AI and the future of national security.

Companies like Anduril and SpaceX have proven that Silicon Valley-style innovation—product-focused, capital-efficient, fast-moving—can thrive in the national security space. So why hasn’t that approach been applied to offensive cyber? Yes, there are legal and secrecy constraints. But those same constraints haven’t stopped commercial companies from building weapons systems or highly classified ISR platforms.

Take a look at the NatSec100 - a curated list of top defense and national security startups. You’ll find companies working on AI, autonomy, sensing, and cybersecurity. But not a single one focused on offensive cyber. Why not?

Shouldn’t we want the best minds at CrowdStrike or Mandiant to spin off and build next-generation offensive platforms? Shouldn’t the DOD and IC be seeding these ideas and building an ecosystem that encourages this kind of innovation?

I believe we should.

Follow Bryan on LinkedIn or right here at The Cipher Brief.

The Cipher Brief is committed to publishing a range of perspectives on national security issues submitted by deeply experienced national security professionals.

Opinions expressed are those of the author and do not represent the views or opinions of The Cipher Brief.

Have a perspective to share based on your experience in the national security field? Send it to Editor@thecipherbrief.com for publication consideration.

Read more expert-driven national security insights, perspective and analysis in The Cipher Brief

Related Articles

(Original Caption) 9/5/1963-Washington, DC- Flying over the Virginia side of the Potomac River, the impressive site of the world's largest office building crops into view. The Pentagon, which covers 34 acres of land including a 5-acre pentagonal center court, houses personnel of the U.S. Department of Defense, which includes the Departments of Army, Navy and Air Force. This bird's eye view also shows part of the 67-acre parking space area.

Assessing the Pentagon’s Mission to Rebuild the ‘Arsenal of Freedom'

DEEP DIVE — The Pentagon is waging war against its own acquisition bureaucracy. In a sweeping speech on Friday, Secretary of War Pete Hegseth [...] More

Winning the Innovation Race: Why America’s Allies Are the Key to Beating Beijing

OPINION — Precision U.S. airstrikes against Iran’s nuclear program last June demonstrate American technological prowess built on decades of 20th [...] More

AI-Powered Adversaries Require AI-Driven Defenses

OPINION — The use of artificial intelligence by adversaries has been the subject of exhaustive speculation. No one doubts that the technology will be [...] More

The Hidden National Security Risk in Smart Cities

OPINION — It is worryingly easy to get hold of personal and sensitive data on American military and intelligence personnel. Earlier this year [...] More

Forget Guerrillas and IEDs - The Next Asymmetric War Will Be Engineered

OPINION — For most of modern history, asymmetric conflict conjured a familiar image: guerrillas in the hills, insurgents planting roadside bombs, or [...] More

A Deniable Attack with Strategic Precision: Why the Red Hat Breach Looks More Like Statecraft Than Mere Crime

EXPERT PERSPECTIVE — The timing was no coincidence.As the U.S. federal government ground to a halt at 12:01 a.m. EDT on October 1, 2025, a [...] More

{{}}