Cybersecurity

× Clear Filters
175 Articles
Bitcoin cryptocurrency on the U.S. flag

How Congress Can Stop the Looming Crypto Disaster

Legislative and administrative accommodation of the crypto industry pose fundamental challenges to control over money and credit.
A collage of images featuring scenes from the Russia - Ukraine War.

Just Security’s Russia–Ukraine War Archive

A catalog of over 100 articles (many with Ukrainian translations) on the Russia Ukraine War -- law, diplomacy, policy options, and more.
Image of the Capital overlayed with digital color blocks

Beyond Data Rescue: Building Structural Safeguards for Federal Data Preservation

Disappearance of vital resources from government websites exposes a fragile ecosystem in which accountability mechanisms have broken down.
gavel hammer with smartphone on blue background.

Online Safety Regulations Around the World: The State of Play and The Way Forward

A global survey and analysis of online safety laws reveals an emerging set of discernible approaches to platform regulation.
A woman with a white scarf over her head, in profile.

Why Guidance is Needed on Open-Source Investigations into Sexual Violence

Guidance on how to conduct digital investigations into sexual violence remains underdeveloped, leaving a dangerous gap.
photograph of Travis LeBlanc speaking into a microphone.

“Fired” Member of U.S. Privacy Oversight Board Discusses What He Considers at Stake

"The risks to U.S. persons, as well as non-U.S. persons, from the misuse, abuse, and exfiltration of data are quite substantial."
Voter Bots And Human Voters as an AI Bot voting and robots Election votes as Artificial intelligence using autonomous voter technologies disrupting elections as computer democracy as a robot vote casting ballots.

The Munich Security Conference Provides an Opportunity to Improve on the AI Elections Accord

Ahead of the Munich Security Conference, one crucial issue is at risk of falling by the wayside: protecting democracy from abuses of AI. 
A close up of the tab from a confidential file folder.

A Step in the Right Direction for Prepublication Review

A recent clarification could help former government employees who once held security clearances publicly write and speak more freely.
Digital generated image of data forming fingerprint icons on black background.

Biden’s Cybersecurity Executive Order and What Comes Next Under Trump

Regardless of what steps Trump takes next, Biden's cybersecurity EO reflects an important consensus on the evolving cyber threat landscape.
The episode title appears with sound waves behind it.

The Just Security Podcast: The Supreme Court’s Decision on TikTok

Marty Lederman, Asha Rangappa, and Xiangnong (George) Wang discuss how the Supreme Court balanced free speech rights and national security concerns in the TikTok case.
A photographic illustration shows a mobile phone near the NSO Group company logo

Spyware Company NSO Group Faces Setbacks in Attempts to Avoid US Lawsuits

In a case brought by WhatsApp, a US court ruled that the NSO Group was liable for hacking and breach of contract.
The photo shows a smartphone held by a woman's hand with a screen showing an array of colorful apps on a black background.

How Social Media Interventions Can Aid Atrocity Prevention

Bridging responsible social media with the expertise of those well-versed in the dynamics of mass violence can greatly bolster interventions.
1-12 of 175 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: