Cyber

× Clear Filters
352 Articles
Visualization of cybersecurity

Unlocking Justice: A Policy Roadmap for Victims of Spyware

To introduce accountability for cyberattacks, Congress should make it clear that U.S. courts are the right venue for spyware cases.
A scale representing digital justice

Discovery in U.S. Spyware Litigation: A Double-Edged Sword?

Despite its inherent risks, civil society and policymakers can learn how to benefit from the discovery process in spyware cases.
A retro computer encircled by CCTV cameras

Legal Frameworks for Addressing Spyware Harms

Introducing a new series on accountability for spyware harms convened by the Atlantic Council in partnership with Just Security.
Visualization of cybersecurity

What It Takes to Stop the Next Salt Typhoon

A roadmap for the Trump administration to address cyber vulnerabilities that persist nearly a year after the Salt Typhoon intrusion.
A woman poses for pictures next to the HQ-9B surface-to-air missile system (L) and the HQ-19 surface-to-air missile system during the 15th China International Aviation and Aerospace Exhibition in Zhuhai, in southern China's Guangdong province on November 15, 2024. (Photo by HECTOR RETAMAL/AFP via Getty Images)

The Future of Arms Control: Time for a New Strategic Framework

Arms control must evolve from a legacy tool of superpower rivalry to a modern instrument of strategic risk management. That work must begin now.

Call Them What They Are: Time to Fix Cyber Threat Actor Naming

The Microsoft-CrowdStrike partnership on cyber threat actor naming conventions is welcome, but more comprehensive reform is needed to serve defenders and the public.
The Just Security Podcast logo

The Just Security Podcast: A Conversation with Jen Easterly — Cybersecurity at a Crossroads

How do leaders steer through cyber crises and chart a path forward? Jen Easterly unpacks challenges, breakthroughs, and lessons from the front lines of U.S. cybersecurity.
Katherine Keneally and Julia Ebner answer questions at the Calleva-Airey Neave Global Security Seminar Series hosted by Oxford University’s Blavatnik School of Government on May 1, 2025.

Q&A with Katherine Keneally: The Future of Terrorism Detection and Analysis

How should we understand evolving terrorism, and what’s needed for better threat assessment? Julia Ebner discussed this with expert Katherine Keneally.

Fireside Chat with Singapore’s Chief of Cybersecurity David Koh: Navigating the New Global Tech Order

Remarks from Singapore's Chief of Cybersecurity David Koh for the Just Security-Oxford Global Tech Policy Seminar Series.
Sen. Patrick Leahy sits in front of a poster with examples of Russian-created Facebook pages

Is the U.S. Abandoning the Fight Against Foreign Information Operations?

The Trump administration's policy shift paves the way for foreign propaganda to flourish, leaving Europe to step into the breach.
A group of Ukrainian women demonstrate against war rape, holding posters.

Ukraine’s Use of Technology in Sexual and Gender-Based Crimes Investigations

Technology can help bring justice for Ukrainian survivors of sexual and gender-based crimes, but the process is not without challenges.
Conceptual image of a laptop surrounded by cloud illustrations and being watched by security cameras

One Step Forward? Agreement on Spyware Regulation in the Pall Mall Process

A new code marks a serious commitment by states to regulate digital surveillance tools, but stops short of agreeing to hard legal standards.
1-12 of 352 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: