Cyber
355 Articles

The Just Security Podcast: What Just Happened – CISA and the Fate of U.S. Cybersecurity
As CISA faces expiration, former FBI official Cynthia Kaiser joins David Aaron to discuss its importance and highlight the risks of failing to reauthorize it.

The Next Cyber Breach Will Not Wait: Why Congress Must Reauthorize CISA 2015
Passing the WIMWIG Act to renew CISA 2015 is vital to defend the foundations of U.S. cybersecurity and technological superiority.

The Just Security Podcast: Sen. Elissa Slotkin on a New Vision for American National Security
The Senator joins Tess Bridgeman and Ryan Goodman for a wide-ranging discussion on the future of national security and foreign policy.

Unlocking Justice: A Policy Roadmap for Victims of Spyware
To introduce accountability for cyberattacks, Congress should make it clear that U.S. courts are the right venue for spyware cases.

Discovery in U.S. Spyware Litigation: A Double-Edged Sword?
Despite its inherent risks, civil society and policymakers can learn how to benefit from the discovery process in spyware cases.

Legal Frameworks for Addressing Spyware Harms
Introducing a new series on accountability for spyware harms convened by the Atlantic Council in partnership with Just Security.

What It Takes to Stop the Next Salt Typhoon
A roadmap for the Trump administration to address cyber vulnerabilities that persist nearly a year after the Salt Typhoon intrusion.

The Future of Arms Control: Time for a New Strategic Framework
Arms control must evolve from a legacy tool of superpower rivalry to a modern instrument of strategic risk management. That work must begin now.

Call Them What They Are: Time to Fix Cyber Threat Actor Naming
The Microsoft-CrowdStrike partnership on cyber threat actor naming conventions is welcome, but more comprehensive reform is needed to serve defenders and the public.

The Just Security Podcast: A Conversation with Jen Easterly — Cybersecurity at a Crossroads
How do leaders steer through cyber crises and chart a path forward? Jen Easterly unpacks challenges, breakthroughs, and lessons from the front lines of U.S. cybersecurity.

Q&A with Katherine Keneally: The Future of Terrorism Detection and Analysis
How should we understand evolving terrorism, and what’s needed for better threat assessment? Julia Ebner discussed this with expert Katherine Keneally.

Fireside Chat with Singapore’s Chief of Cybersecurity David Koh: Navigating the New Global Tech Order
Remarks from Singapore's Chief of Cybersecurity David Koh for the Just Security-Oxford Global Tech Policy Seminar Series.