Cyber
346 Articles

The Just Security Podcast: A Conversation with Jen Easterly — Cybersecurity at a Crossroads
How do leaders steer through cyber crises and chart a path forward? Jen Easterly unpacks challenges, breakthroughs, and lessons from the front lines of U.S. cybersecurity.

Q&A with Katherine Keneally: The Future of Terrorism Detection and Analysis
How should we understand evolving terrorism, and what’s needed for better threat assessment? Julia Ebner discussed this with expert Katherine Keneally.

Fireside Chat with Singapore’s Chief of Cybersecurity David Koh: Navigating the New Global Tech Order
Remarks from Singapore's Chief of Cybersecurity David Koh for the Just Security-Oxford Global Tech Policy Seminar Series.

Is the U.S. Abandoning the Fight Against Foreign Information Operations?
The Trump administration's policy shift paves the way for foreign propaganda to flourish, leaving Europe to step into the breach.

Ukraine’s Use of Technology in Sexual and Gender-Based Crimes Investigations
Technology can help bring justice for Ukrainian survivors of sexual and gender-based crimes, but the process is not without challenges.

One Step Forward? Agreement on Spyware Regulation in the Pall Mall Process
A new code marks a serious commitment by states to regulate digital surveillance tools, but stops short of agreeing to hard legal standards.

Online Safety Regulations Around the World: The State of Play and The Way Forward
A global survey and analysis of online safety laws reveals an emerging set of discernible approaches to platform regulation.

#War #Sponsored: Using Targeted Ads to Promote Compliance with International Humanitarian Law
As combatants sit in the trenches – scrolling, posting, taking selfies – they can be targeted with online ads that espouse the laws of war.

When AI Fuels Atrocities — And How It Can Help Prevent Them
Generative AI can fuel new forms of manipulation, but also holds promise for mitigating atrocities and enabling early detection.

Signal Gate: The Criminal Law Precedents That Are Most Relevant
A range of federal laws, including the Espionage Act and laws against the destruction of government records, could apply in this case.

“Fired” Member of U.S. Privacy Oversight Board Discusses What He Considers at Stake
"The risks to U.S. persons, as well as non-U.S. persons, from the misuse, abuse, and exfiltration of data are quite substantial."

Confronting Gendered Harm in Cyberspace is not a Matter of Social Justice — It’s a National Security Imperative
Despite the worsening cyber threat landscape, U.N. cyber norms remain gender-blind, undermining States' ability to protect all citizens.