Cyber

× Clear Filters
357 Articles
Biden and Putin sit in chairs in front of the American and Russian flags in a library. June 16, 2021

Three International Law Rules for Responding Effectively to Hostile Cyber Operations

Express endorsement of three legal policy positions would go far in ensuring the door to effective cyber responses is open.
Abstract Background - Cyber Internet

Artificial Intelligence in the Intelligence Community: Money is Not Enough

Congress wants to spend hundreds of billions of dollars on competitiveness in emerging technology, and AI in particular. But spending it effectively requires reforms to the Intelligence…
A depiction of network circles that change color as they are infected with a virus. The background shows letters and numbers as if it were computer coding.

Holding the LINE: Chinese Cyber Influence Campaigns After the Pandemic

An analysis of China's cyber influence tactics in Taiwan's 2020 elections can help us understand the extent of China’s capabilities and how to prepare for future operations.
A person types on a laptop. Translucent icons litter the image to represent cybersecurity.

Protect Communications Privacy for All of Us—Not Just Lawmakers and Reporters

It’s Time for Congress to Finish What It Started After the Snowden Revelations.
The dome of the US Capitol Building against a blue sky.

The Internet of Things Moment: My Testimony Before the Senate Judiciary Subcommittee

I was asked to testify at a Senate hearing about home technologies and antitrust. The growth of the consumer-facing “Internet of Things” continues, and it has complicated,…
Jen Easterly, nominee to be the Director of the Homeland Security Cybersecurity and Infrastructure Security Agency, and Chris Inglis, nominee to be the National Cyber Director, testify during their confirmation hearing before the Senate Homeland Security and Governmental Affairs Committee on June 10, 2021 in Washington, DC.

Four Key Takeaways from the Senate’s Cybersecurity Confirmation Hearing

There were approximately 65,000 ransomware attacks last year in the United States, and that number doesn’t seem to be slowing down. Over the past few weeks, cybersecurity has…
A 3D hologram of the globe with circles and grids laid over to indicate communications and technology.

The Sixth United Nations GGE and International Law in Cyberspace

Top expert analysis of the much-anticipated report that provides consensus views among key States on the application of international law to cyberspace.
An image of the globe with a light grid laid on top of it connecting people and countries.

Oxford Statement on International Law Protections in Cyberspace: The Regulation of Information Operations and Activities

The Internet has allowed the dissemination of content across the globe in a matter of seconds. Recommendation algorithms, found in social media platforms and search engines, have…
In an aerial view, fuel holding tanks are seen at Colonial Pipeline's Dorsey Junction Station on May 13, 2021 in Woodbine, Maryland.

It’s Time for Congress to Push Companies to Come Forward on Hacks

The United States can’t address cyber threats from sophisticated nation State actors like Russia and China if it doesn’t know about them.

Same Data, Same Strategy: A New Look at How the Trump Campaign and Russian Intelligence Operated in 2016

The recent Biden administration sanctions on the Russian government are part of an ongoing effort to push back against the Kremlin’s malign influence campaign against the West.…
Temel Atacocugu wipes tears with a tissue as he speaks on behalf of the injured during the National Remembrance Service at Christchurch Arena on March 13, 2021 in Christchurch, New Zealand. Another person stands nearby with a hand on his shoulder in a comforting manner.

On Christchurch Call Anniversary, a Step Closer to Eradicating Terrorism Online?

Governments, including now the US, and companies take stock on the second anniversary of the New Zealand mosque shootings.
A Colonial Pipeline storage site in Charlotte, North Carolina on May 12, 2021.

The New Cyber Executive Order is a Good Start, But Needs a Supercharge from Congress

Implementation can strengthen the data contractors have to provide. And Congress should pass legislation to apply these measures across the economy.
1-12 of 357 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: