Cyber

× Clear Filters
359 Articles
A search bar with the http address for Twitter’s top tweets.

Exploring Gray Zones and LikeWar

"This is a book about how a new kind of communications became a new kind of war,” Peter Singer and Emerson Brooking write in their new book: LikeWar: The Weaponization of Social…

The Politics of Trump’s Mismatched Response to Election Interference

With just over a month until the midterm elections, President Donald Trump took to the UN Security Council to call out an adversary in the room for interfering in our elections.…

So, You Want to Do Something About Russian Election Interference?

If this White House were actually serious about tackling foreign interference in our elections, what would it do? 

Putin Had a Win-Win Strategy for Life Post-2016; Trump, Not So Much

Putin didn't just count on Clinton losing. He also counted on her winning. Three former U.S. Intelligence Community officials analyze Putin's likely strategic thinking in 2016…

17 Years Later: Applying Post-9/11 Lessons to Potential Cyber Attacks

Seventeen years ago today, Americans learned all too tragically that, as the 9/11 Commission later put it, “the system was blinking red” for a reason. Our country, we came…

Election Interference Is Just a Symptom. Evaporation of Trust is the Disease.

We need to recognize our cognitive infrastructure, on which trust is built, as a critical national asset that’s crumbling, and we need to shore it up—fast. It’s a challenge…

Locking in Transparency on the Vulnerabilities Equities Process

Eight months ago, the White House released a charter for the Vulnerabilities Equities Process (VEP), the interagency mechanism by which the federal government decides whether to…

Cybersecurity and the 2020 Census: Are We Prepared?

A U.S. Census Bureau employee uses a UNIVAC 1105 computer to tabulate data following the 1960 Census. Image: U.S. government via Wikimedia Commons. Just Security readers may find…

Six Big Takeaways from Mueller’s Indictment of Russian Intel Officers

One of the biggest takeaways from Mueller's indictment? WikiLeaks appears to have been deeply involved in a Russian intelligence operation.
Locks on $100 bill with an internet browser overlaid.

Information Operations are a Cybersecurity Problem: Toward a New Strategic Paradigm to Combat Disinformation

A call to shift efforts against disinformation into a cyber security paradigm, and to forge collaboration between independent academic researchers and tech companies.

Protecting Civilians in Cyberspace: Ideas for the Road Ahead

Distinctions between offline and online conflicts are blurring as tools and tactics deployed in cyberspace trigger real world consequences. In Mexico, for example, commercial spyware…

The Technicolor Zone of Cyberspace, Part 2

What did the UK attorney general say about the principle of sovereignty in cyberspace and countermeasures as a self-help remedy to cyber-enabled breaches of international law?
1-12 of 359 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: