top of page


John Edwards
Feb 28, 2024
U.S. National Security Depends on American Tech and a Healthy Relationship with Risk
Former CIA D/COO John Edwards calls for closer collaboration between the USG and tech industry.


Kelly Bissell
Jan 17, 2024
A New Year Means Further Transformative Shifts in Cyber
CIG Principal Member Kelly Bissell predicts transformative shifts in cyber in 2024.


Adam Maruyama
Dec 14, 2023
To Beat China and Russia in Cyberspace, Change the Game
Adam Maruyama argues that comapnies must shift from responding to cyberattacks toward a more preventative approach.


Chris Menza and Laura Yoeckel-Kelly
Oct 3, 2023
Innovative Business Models Can Accelerate Tech for IC Missions
Chris Menza and Lauren Yoeckel-Kelly urge the intelligence community to accelerate its fielding of innovative, mission-driven capabilities.


Jon Darby
Mar 23, 2023
Our Biggest Cyber Vulnerability
Jon Darby Former Director of the Operations Directorate, NSA/CSS Network vulnerabilities come in many forms and as a result, there is a...

Suzanne Spaulding
Mar 21, 2023
Q&A with Suzanne Spaulding
Suzanne Spaulding Senior Adviser, Homeland Security, International Security Program, CSIS What’s top of mind for you in cyber right now...


Steve Hill
Mar 20, 2023
Our Greatest Cyber Challenge is that of Execution
Steve Hill Deputy Group CISO, Credit Suisse The cyber dimension to the war in Ukraine has been a revelation. The presumption of offensive...


Debora A. Plunkett
Mar 10, 2023
Watching But Not Waiting: Vigilance, Diligence, and Resilience on Cybersecurity
Debora A. Plunkett Principal, Plunkett Associated LLC In the past year, the cybersecurity landscape has been rich with new partnerships,...

The Cipher Brief Team
Jan 24, 2023
Q&A with Paolo Dal Cin
Paolo Dal Cin Global Lead, Accenture Security What’s top of mind for you in cyber right now and why? We are hearing four consistent...

The Cipher Brief Team
Jan 12, 2023
Q&A with Rick Ledgett
Rick Ledgett Former Deputy Director, NSA / CIG Principal What’s top of mind for you in cyber right now and why? One thing that I’m...


Walter Pincus
Jan 10, 2023
The Pentagon's Cyber Personnel Issue Need More Attention
OPINION — The Army, which seeks to double the size of its cyber forces over the next five years, is already short-staffed in two key...


Greg McCullough
Nov 28, 2022
Data-Driven Cybersecurity is a Superweapon
BOOZ ALLEN HAMILTON / KNOWLEDGE PARTNER PERSPECTIVE — Today, organizations are operating cyber, privacy, and security workstreams within...


Jim Rosenthal
Nov 27, 2022
Six Steps Every Organization Can Take to Reduce Cyber Risk in their Supply Chain
SPONSORED — Cyberattacks that disrupt enterprise and government organizations are common and increasingly successful. BlueVoyant surveyed...


What We Need are More Cyber Warrior Scholars
ALTERNATIVE PERSPECTIVES — The cyber domain is emerging as the first choice of battle space for many foreign adversaries of the United...


Mark Montgomery and Jiwon Ma
Aug 4, 2022
Money and Partnerships Matter in Cybersecurity
EXPERT PERSPECTIVE – The White House’s recent announcement of a Strategic High-Level Dialogue on Technology with Israel and the Jerusalem...


Mark Montgomery
Jul 11, 2022
Equipping U.S. Partners in Cyberspace is a Must
Co-author Jiwon Ma is a program analyst at CCTI, where she contributes to the CSC 2.0 project. Follow Ma and Montgomery on Twitter...


Paolo Dal Cin
Jul 6, 2022
Providing Protection from the Perfect Cyber Storm
EXPERT PERSPECTIVE — We’re witnessing the perfect storm. The disruptive pandemic has put pressure on cybersecurity teams, as widescale...


Robert Hannigan
Jul 6, 2022
The Complex Reality of Cyber War and Ukraine
EXPERT PERSPECTIVE — There has been widespread surprise in the media that the ground war in Ukraine has not spilled over into large scale...

The Cipher Brief
May 11, 2022
The National Security Implications of New Rules of the Road for Cyber
EXPERT PERSPECTIVE — The Cyber Initiatives Group (powered by The Cipher Brief) filed national security-related comments in support of the...


Phil Venables
Mar 28, 2022
In Cyber: Resilience is about Capabilities, not Plans
EXPERT PERSPECTIVE — Over the past 2 years, since I wrote the first version of this post, we’ve had a lot of opportunity to test our...
bottom of page