AI & Emerging Technology

Cyber

× Clear Filters
456 Articles
Delegates pose for photos at the signing ceremony of the United Nations Convention against Cybercrime

The Promise and Peril of the U.N. Convention Against Cybercrime

It is up to democracies to ensure that repressive regimes do not abuse the new U.N. Cybercrime Convention to undermine fundamental freedoms.
In an aerial view, the Kayenta Solar Plant is seen

Securing Solar: Why the Next Great Infrastructure Risk Is Distributed

States and utility companies can act now to transform solar energy from a security liability into a resilient pillar of national power.
Lady Justice against laptop monitor

Will Victims of Cyber Attacks Soon Get Their Day in Court? Options for Accountability for Cyber Attacks

More cyber litigation will appear on the docket as pathways to legal accountability for unlawful State-sponsored cyber operations strengthen.
A collage of images featuring scenes from the Russia - Ukraine War.

Just Security’s Russia–Ukraine War Archive

A catalog of over 100 articles (many with Ukrainian translations) on the Russia Ukraine War -- law, diplomacy, policy options, and more.
In this pool photograph distributed by the Russian state agency Sputnik, Russia's President Vladimir Putin chairs a Security Council meeting via a videoconference at the Kremlin in Moscow on July 25, 2025. (Photo by SERGEI ILYIN/POOL/AFP via Getty Images)

Russian Motivations Behind the “Hanoi Convention” Against Cybercrime

Russia’s cybercrime stance reflects a broader push to assert state control over the internet, restrict dissent, and build global backing for its governance model.
A faceless hacker running malware on a laptop

The Rome Statute in the Digital Age: Confronting Emerging Cyber Threats

For the Rome Statute to remain relevant, practitioners must understand how governments can deploy spyware to commit international crimes.
The Just Security Podcast

The Just Security Podcast: What Just Happened – CISA and the Fate of U.S. Cybersecurity

As CISA faces expiration, former FBI official Cynthia Kaiser joins David Aaron to discuss its importance and highlight the risks of failing to reauthorize it. 
Security padlock and circuit board

The Next Cyber Breach Will Not Wait: Why Congress Must Reauthorize CISA 2015

Passing the WIMWIG Act to renew CISA 2015 is vital to defend the foundations of U.S. cybersecurity and technological superiority.
The Just Security Podcast

The Just Security Podcast: Sen. Elissa Slotkin on a New Vision for American National Security

The Senator joins Tess Bridgeman and Ryan Goodman for a wide-ranging discussion on the future of national security and foreign policy.
Visualization of cybersecurity

Unlocking Justice: A Policy Roadmap for Victims of Spyware

To introduce accountability for cyberattacks, Congress should make it clear that U.S. courts are the right venue for spyware cases.
A scale representing digital justice

Discovery in U.S. Spyware Litigation: A Double-Edged Sword?

Despite its inherent risks, civil society and policymakers can learn how to benefit from the discovery process in spyware cases.
A retro computer encircled by CCTV cameras

Legal Frameworks for Addressing Spyware Harms

Introducing a new series on accountability for spyware harms convened by the Atlantic Council in partnership with Just Security.
1-12 of 456 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: