AI & Emerging Technology

Cyber

× Clear Filters
459 Articles
U.S. President Donald Trump (R) and Chinese President Xi Jinping (L) sit across from each other at a long table, each flanked on the right and left side of the image, respectively, by other officials, with three flags each of the United States and China, alternating along the back wall at the far end of the table.

Trump’s Chip Strategy Needs Recalibration

Facing the challenge from China, U.S. technological leadership in the century ahead requires a focused and disciplined strategy coordinated with allies.
Conceptual and abstract digital generated image of multiple AI chat icons hovering over a digital surface with shallow depth of field in white and gray tones

AI Model Outputs Demand the Attention of Export Control Agencies

The conversation about AI and national security must expand beyond semiconductors and model weights to encompass the outputs those technologies enable.
U.S. Rep. Raja Krishnamoorthi (D-IL) (R) speaks as Rep. Joaquin Castro (D-TX) looks on

Questions Lawmakers Should Ask About Inspector General Report on Signalgate

The OIG report on the "Signalgate" incident is far from the “total exoneration” claimed by Hegseth and his aides.
A collage of images featuring scenes from the Russia - Ukraine War.

Just Security’s Russia–Ukraine War Archive

A catalog of over 100 articles (many with Ukrainian translations) on the Russia Ukraine War -- law, diplomacy, policy options, and more.
Delegates pose for photos at the signing ceremony of the United Nations Convention against Cybercrime

The Promise and Peril of the U.N. Convention Against Cybercrime

It is up to democracies to ensure that repressive regimes do not abuse the new U.N. Cybercrime Convention to undermine fundamental freedoms.
In an aerial view, the Kayenta Solar Plant is seen

Securing Solar: Why the Next Great Infrastructure Risk Is Distributed

States and utility companies can act now to transform solar energy from a security liability into a resilient pillar of national power.
Lady Justice against laptop monitor

Will Victims of Cyber Attacks Soon Get Their Day in Court? Options for Accountability for Cyber Attacks

More cyber litigation will appear on the docket as pathways to legal accountability for unlawful State-sponsored cyber operations strengthen.
In this pool photograph distributed by the Russian state agency Sputnik, Russia's President Vladimir Putin chairs a Security Council meeting via a videoconference at the Kremlin in Moscow on July 25, 2025. (Photo by SERGEI ILYIN/POOL/AFP via Getty Images)

Russian Motivations Behind the “Hanoi Convention” Against Cybercrime

Russia’s cybercrime stance reflects a broader push to assert state control over the internet, restrict dissent, and build global backing for its governance model.
A faceless hacker running malware on a laptop

The Rome Statute in the Digital Age: Confronting Emerging Cyber Threats

For the Rome Statute to remain relevant, practitioners must understand how governments can deploy spyware to commit international crimes.
The Just Security Podcast

The Just Security Podcast: What Just Happened – CISA and the Fate of U.S. Cybersecurity

As CISA faces expiration, former FBI official Cynthia Kaiser joins David Aaron to discuss its importance and highlight the risks of failing to reauthorize it. 
Security padlock and circuit board

The Next Cyber Breach Will Not Wait: Why Congress Must Reauthorize CISA 2015

Passing the WIMWIG Act to renew CISA 2015 is vital to defend the foundations of U.S. cybersecurity and technological superiority.
The Just Security Podcast

The Just Security Podcast: Sen. Elissa Slotkin on a New Vision for American National Security

The Senator joins Tess Bridgeman and Ryan Goodman for a wide-ranging discussion on the future of national security and foreign policy.
1-12 of 459 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: