top of page


Jon Darby
Mar 23, 2023
Our Biggest Cyber Vulnerability
Jon Darby Former Director of the Operations Directorate, NSA/CSS Network vulnerabilities come in many forms and as a result, there is a...

The Cipher Brief Team
Jan 12, 2023
Q&A with Rick Ledgett
Rick Ledgett Former Deputy Director, NSA / CIG Principal What’s top of mind for you in cyber right now and why? One thing that I’m...


Greg McCullough
Nov 28, 2022
Data-Driven Cybersecurity is a Superweapon
BOOZ ALLEN HAMILTON / KNOWLEDGE PARTNER PERSPECTIVE — Today, organizations are operating cyber, privacy, and security workstreams within...


Jim Rosenthal
Nov 27, 2022
Six Steps Every Organization Can Take to Reduce Cyber Risk in their Supply Chain
SPONSORED — Cyberattacks that disrupt enterprise and government organizations are common and increasingly successful. BlueVoyant surveyed...


Mark Montgomery and Jiwon Ma
Aug 4, 2022
Money and Partnerships Matter in Cybersecurity
EXPERT PERSPECTIVE – The White House’s recent announcement of a Strategic High-Level Dialogue on Technology with Israel and the Jerusalem...


Paolo Dal Cin
Jul 6, 2022
Providing Protection from the Perfect Cyber Storm
EXPERT PERSPECTIVE — We’re witnessing the perfect storm. The disruptive pandemic has put pressure on cybersecurity teams, as widescale...


Phil Venables
Mar 28, 2022
In Cyber: Resilience is about Capabilities, not Plans
EXPERT PERSPECTIVE — Over the past 2 years, since I wrote the first version of this post, we’ve had a lot of opportunity to test our...
bottom of page