Cyber

× Clear Filters
355 Articles
The Just Security Podcast

The Just Security Podcast: What Just Happened – CISA and the Fate of U.S. Cybersecurity

As CISA faces expiration, former FBI official Cynthia Kaiser joins David Aaron to discuss its importance and highlight the risks of failing to reauthorize it. 
Security padlock and circuit board

The Next Cyber Breach Will Not Wait: Why Congress Must Reauthorize CISA 2015

Passing the WIMWIG Act to renew CISA 2015 is vital to defend the foundations of U.S. cybersecurity and technological superiority.
The Just Security Podcast

The Just Security Podcast: Sen. Elissa Slotkin on a New Vision for American National Security

The Senator joins Tess Bridgeman and Ryan Goodman for a wide-ranging discussion on the future of national security and foreign policy.
Visualization of cybersecurity

Unlocking Justice: A Policy Roadmap for Victims of Spyware

To introduce accountability for cyberattacks, Congress should make it clear that U.S. courts are the right venue for spyware cases.
A scale representing digital justice

Discovery in U.S. Spyware Litigation: A Double-Edged Sword?

Despite its inherent risks, civil society and policymakers can learn how to benefit from the discovery process in spyware cases.
A retro computer encircled by CCTV cameras

Legal Frameworks for Addressing Spyware Harms

Introducing a new series on accountability for spyware harms convened by the Atlantic Council in partnership with Just Security.
Visualization of cybersecurity

What It Takes to Stop the Next Salt Typhoon

A roadmap for the Trump administration to address cyber vulnerabilities that persist nearly a year after the Salt Typhoon intrusion.
A woman poses for pictures next to the HQ-9B surface-to-air missile system (L) and the HQ-19 surface-to-air missile system during the 15th China International Aviation and Aerospace Exhibition in Zhuhai, in southern China's Guangdong province on November 15, 2024. (Photo by HECTOR RETAMAL/AFP via Getty Images)

The Future of Arms Control: Time for a New Strategic Framework

Arms control must evolve from a legacy tool of superpower rivalry to a modern instrument of strategic risk management. That work must begin now.

Call Them What They Are: Time to Fix Cyber Threat Actor Naming

The Microsoft-CrowdStrike partnership on cyber threat actor naming conventions is welcome, but more comprehensive reform is needed to serve defenders and the public.
The Just Security Podcast logo

The Just Security Podcast: A Conversation with Jen Easterly — Cybersecurity at a Crossroads

How do leaders steer through cyber crises and chart a path forward? Jen Easterly unpacks challenges, breakthroughs, and lessons from the front lines of U.S. cybersecurity.
Katherine Keneally and Julia Ebner answer questions at the Calleva-Airey Neave Global Security Seminar Series hosted by Oxford University’s Blavatnik School of Government on May 1, 2025.

Q&A with Katherine Keneally: The Future of Terrorism Detection and Analysis

How should we understand evolving terrorism, and what’s needed for better threat assessment? Julia Ebner discussed this with expert Katherine Keneally.

Fireside Chat with Singapore’s Chief of Cybersecurity David Koh: Navigating the New Global Tech Order

Remarks from Singapore's Chief of Cybersecurity David Koh for the Just Security-Oxford Global Tech Policy Seminar Series.
1-12 of 355 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: