Cyber

× Clear Filters
346 Articles
The Just Security Podcast logo

The Just Security Podcast: A Conversation with Jen Easterly — Cybersecurity at a Crossroads

How do leaders steer through cyber crises and chart a path forward? Jen Easterly unpacks challenges, breakthroughs, and lessons from the front lines of U.S. cybersecurity.
Katherine Keneally and Julia Ebner answer questions at the Calleva-Airey Neave Global Security Seminar Series hosted by Oxford University’s Blavatnik School of Government on May 1, 2025.

Q&A with Katherine Keneally: The Future of Terrorism Detection and Analysis

How should we understand evolving terrorism, and what’s needed for better threat assessment? Julia Ebner discussed this with expert Katherine Keneally.

Fireside Chat with Singapore’s Chief of Cybersecurity David Koh: Navigating the New Global Tech Order

Remarks from Singapore's Chief of Cybersecurity David Koh for the Just Security-Oxford Global Tech Policy Seminar Series.
Sen. Patrick Leahy sits in front of a poster with examples of Russian-created Facebook pages

Is the U.S. Abandoning the Fight Against Foreign Information Operations?

The Trump administration's policy shift paves the way for foreign propaganda to flourish, leaving Europe to step into the breach.
A group of Ukrainian women demonstrate against war rape, holding posters.

Ukraine’s Use of Technology in Sexual and Gender-Based Crimes Investigations

Technology can help bring justice for Ukrainian survivors of sexual and gender-based crimes, but the process is not without challenges.
Conceptual image of a laptop surrounded by cloud illustrations and being watched by security cameras

One Step Forward? Agreement on Spyware Regulation in the Pall Mall Process

A new code marks a serious commitment by states to regulate digital surveillance tools, but stops short of agreeing to hard legal standards.
gavel hammer with smartphone on blue background.

Online Safety Regulations Around the World: The State of Play and The Way Forward

A global survey and analysis of online safety laws reveals an emerging set of discernible approaches to platform regulation.
A navigator, with the call sign Actor, and a drone operator with the callsign Sapsan rest while looking at their phones in a forward bunker position on the Southern frontline near Orikhiv, Ukraine

#War #Sponsored: Using Targeted Ads to Promote Compliance with International Humanitarian Law

As combatants sit in the trenches – scrolling, posting, taking selfies – they can be targeted with online ads that espouse the laws of war.
A phone screen displays a video featuring an AI-generated avatar depicting a TV news anchor on a fictional Venezuelan newscast

When AI Fuels Atrocities — And How It Can Help Prevent Them

Generative AI can fuel new forms of manipulation, but also holds promise for mitigating atrocities and enabling early detection.
Central Intelligence Agency Director John Ratcliffe (R), accompanied by FBI Director Kash Patel (L), and Director of National Intelligence Tulsi Gabbard (C)

Signal Gate: The Criminal Law Precedents That Are Most Relevant

A range of federal laws, including the Espionage Act and laws against the destruction of government records, could apply in this case.
photograph of Travis LeBlanc speaking into a microphone.

“Fired” Member of U.S. Privacy Oversight Board Discusses What He Considers at Stake

"The risks to U.S. persons, as well as non-U.S. persons, from the misuse, abuse, and exfiltration of data are quite substantial."
Digital generated image of multi coloured data against black background.

Confronting Gendered Harm in Cyberspace is not a Matter of Social Justice — It’s a National Security Imperative

Despite the worsening cyber threat landscape, U.N. cyber norms remain gender-blind, undermining States' ability to protect all citizens.
1-12 of 346 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: