top of page
John Edwards
Feb 28, 2024
U.S. National Security Depends on American Tech and a Healthy Relationship with Risk
Former CIA D/COO John Edwards calls for closer collaboration between the USG and tech industry.
Mark Montgomery and Michael Sugden
Feb 15, 2024
Hackers are Taking Advantage of Gaps in U.S. Cybersecurity Policy
Rear Adm. Mark Montgomery (Ret.) and Michael Sugden discuss how policymakers are protecting you from firmware hackers.
Ellen McCarthy and Doowan Lee
Feb 12, 2024
Information Quality is a Democratic Necessity in the Age of AI
Hon. Ellen McCarthy and Doowan Lee discuss how trust in our institutions and elections have been impacted in the age of AI.
Patrick Weninger
Feb 8, 2024
Elections are Primed for ‘Wave of Misinformation’
Cipher Brief Expert and former senior CIA Intelligence Officer Patrick Weninger warns of misinformation threat in elections this year.
Dave Spirk and Jon Gruen
Feb 5, 2024
From the Battlefield to Your Backyard: The Looming Drone Threat in America
Dave Spirk and Jon Gruen discuss the threat of drones and how the U.S. can safeguard our skies whlie using the technology for good.
Michael Casey
Jan 24, 2024
Loose lips can still sink ships: Protect your Critical Information
Director of the Counterintelligence and Security Center (NCSC) Michael C. Casey writes on OPSEC challenges in today's digital age.
Kelly Bissell
Jan 17, 2024
A New Year Means Further Transformative Shifts in Cyber
CIG Principal Member Kelly Bissell predicts transformative shifts in cyber in 2024.
Walter Pincus
Jan 16, 2024
Taiwan’s Election Offers Strong Lessons on Disinformation
Walter Pincus discusses the lessons from Taiwan's efforts to counter disinformation in its recent election.
Walter Pincus
Jan 2, 2024
DARPA’s Focus on ‘Manipulated Media’ Lays Out Technology for Combatting Disinformation and more
Cipher Brief Senior National Security Columnist Walter Pincus examines DARPA's focus on using AI to counter disinformation.
Klon Kitchen
Jan 2, 2024
The Administration’s Confusion on AI is Bad for U.S. Security
Klon Kitchen discusses the Biden administration's approach to artificial intelligence.
Chip Usher and Kristin Wood
Dec 21, 2023
The Intelligence Community ‘Can’ Tackle Open-Source Data in a Hyper-Connected World
Chip Usher and Kristin Wood discuss how the IC can leverage open-source data to bolster national security.
Adam Maruyama
Dec 14, 2023
To Beat China and Russia in Cyberspace, Change the Game
Adam Maruyama argues that comapnies must shift from responding to cyberattacks toward a more preventative approach.
Ken Westbrook
Dec 8, 2023
Foreign Criminals are Scamming Americans out of Billions of Dollars. Is it a National Security Threat?
Ken Westbrook argues that it is important to label scam attacks on US consumers as a national secuirty threat.
Mark Montgomery and Jiwon Ma
Dec 1, 2023
Targeting FBI Budget Makes Us More Vulnerable on Cyber
Could proposed FBI budget cuts impact the U.S.'s ability to eliminate safe havens for cyber criminals?
Mark Montgomery and Jiwon Ma
Nov 6, 2023
Defense Department Report Highlights Cyber Threat from China
What does the new DoD report tell us about the cyber threat from China?
Andrew Borene
Oct 19, 2023
Chinese and Russian Space Pursuits Are Picking Allied Pockets
Andrew Borene highlights threats to the U.S. space industry.
Dr. Sean Guillory
Oct 18, 2023
Warning Signs for How Generative AI Will Impact the Next Election
Dr. Sean Guillory of Booz Allen Hamilton writes on how generative AI will influence the upcoming 2024 election.
Chris Menza and Laura Yoeckel-Kelly
Oct 3, 2023
Innovative Business Models Can Accelerate Tech for IC Missions
Chris Menza and Lauren Yoeckel-Kelly urge the intelligence community to accelerate its fielding of innovative, mission-driven capabilities.
Tom Pfeifer
Sep 22, 2023
Financial Sector Cybersecurity is National Security
Tom Pfeifer Executive Vice President at Booz Allen Hamilton OPINION — The world stands at an existential crossroads, torn between dueling...
Jon Darby
Mar 23, 2023
Our Biggest Cyber Vulnerability
Jon Darby Former Director of the Operations Directorate, NSA/CSS Network vulnerabilities come in many forms and as a result, there is a...
bottom of page