Andrea Little Limbago

Technical Writer, Writer

PhD Computational social scientist researching and writing at the intersection of cybersecurity, technology, and geopolitics

Dr. Andrea Little Limbago is the Chief Social Scientist at Virtru, where she researches and writes on cybersecurity, privacy, geopolitics, and technological innovation. She previously was a technical leader at Endgame, where she directed the company’s technical content, and served as editor-in-chief of the Endgame blog. Her writing has been featured in numerous outlets, including Politico, the Hill, VentureBeat, Forbes, War on the Rocks, and Dark Reading, and she has presented at a range of security conferences (e.g., Enigma, DerbyCon BSidesLV, SXSW), government conferences (e.g. SOCOM’s Global Synchronization), and in academia (e.g. International Studies Association Annual Conference). She has previously worked in academia and at the Joint Warfare Analysis Center, and has excelled in interdisciplinary environments in both the public and private sectors. While at JWAC, Andrea received the Command’s top award for technical excellence for her analytic support across the Department of Defense. Andrea holds a PhD in Political Science from the University of Colorado at Boulder, where she taught a variety of international relations and foreign policy courses, and a bachelor’s degree from Bowdoin College.
Content Types
Blog Post, Interview, Presentation, Whitepaper, Article
More Information

Published Content

5 trends to expect in the new big data protection revolution
January 17th, 2020
A Security Strategy That Centers on Humans, Not Bugs
November 19th, 2019
How to Minimize Security Debt From the Start Andrea Little Limbago
October 21st, 2019
Don't Disarm Individuals in the Battle for Data Protection, Privacy and Security
July 31st, 2019
On China: We Won’t Be Fooled Again
June 27th, 2019
Stop demonizing encryption
May 28th, 2019
National Security Institute Publishes New NSI Report:
May 23rd, 2019
On Security and Privacy, States Are Taking the Lead
May 10th, 2019
Internet Data Privacy Regulation: Not If, but How and by Whom
May 8th, 2019
Data Privacy Manifestos: Competitive Advantage or the Start of Something Bigger?
March 26th, 2019
Privacy Futures: Fed-up Consumers Take Their Data Back
December 19th, 2018
Owning the Quantum Keys to the Kingdom
November 16th, 2018
Nation-State Phishing: A Country-Sized Catch
October 29th, 2018
Cybersecurity’s insidious new threat: workforce stress
August 7th, 2018
No time for stalling: The urgent need for an election hacking response
July 24th, 2018
Smaller Nation State Attacks: A Growing Cyber Menace
July 18th, 2018
Trump Could Address a Major Security Problem At His Putin Summit — But He Won’t
July 16th, 2018
Mueller’s Bombshell Russia Indictments May Mark A New Era For American Democracy
February 19th, 2018
How Cyberattacks Will Affect The Average Person In 2018
January 30th, 2018
Cyber-Security Jobs Aren't Just for Hackers Anymore
January 29th, 2018
Why So Few Women Work In Cyber Security (And How We Can Change It)
January 29th, 2018
What the rise of cyber indictments means for 2018
January 10th, 2018
Why cybersecurity workers are some of the hardest to retain
November 11th, 2017
The ‘Hacking Back’ Bill Isn’t the Answer to Cyberattacks
October 31st, 2017
Deviation From The Norm: Cyberattacks on the Rise
October 12th, 2017
China’s Global Charm Offensive
August 28th, 2017
Destructive cyberattacks are only going to get worse
September 13th, 2017
The dangers of hacking back
May 31st, 2017
WannaCry malware is just the latest warning sign when it comes to global cyber insecurity
May 15th, 2017
DOJ indictment of Russian hackers shows attribution is possible

DOJ indictment of Russian hackers shows attribution is possible

March 20th, 2017
Opinion: The trouble with Trump's Russia reset
February 8th, 2017
Opinion: Trump’s internet opportunity
January 11th, 2017
Why Washington must help U.S. companies respond to cyberattacks
December 14th, 2016
The global push for cyber sovereignty Is the beginning of cyber fascism
December 14th, 2016
What’s Making Some Women in Cyber So Tired – Context: By New America
November 1st, 2016
Predicting heightened malicious cyber activity, the old fashioned way
July 20th, 2016
Brexit security implications: Major, and only starting to unfold
June 30th, 2016
Opinion: No one knows how to define cyberwar – and that's a problem
May 20th, 2016
The Real “Weakest Link” In Security Isn’t What You Think
May 4th, 2016
When Unicorns are the Majority
April 7th, 2016
From the Silver Screen to Cybersecurity
January 19th, 2016
One Size Does Not Fit All: The Multifaceted Nature of Cyber Statecraft
July 1st, 2015

Sample Presentations & Interviews

There is no back door.
January 22nd, 2020
VB2019 presentation: Building secure sharing systems that treat humans as features not bugs
October 3rd, 2019
USENIX Enigma 2019, Andrea Little Limbago’s ‘Digital Authoritarianism, Data Protection, And The Battle’s
September 21st, 2019
Playing to Win: What Makes a Winning Abstract
May 15th, 2019
FT Podcast: Who Sets the Internet Standards?
October 28th, 2018
These are the hackers targeting the midterm election
October 10th, 2018
BSides DC 2018 - Dropping Cyber Norms: What They are & How They Will Shape the Internet
October 27th, 2018
How hacktivist groups pose a global cybersecurity threat
© ClearVoice, Inc.