Cyber

× Clear Filters
357 Articles
Just Security

New Cybersecurity Primer by the Center for a New American Security

Last week the Center for a New American Security (CNAS) released a new report on cybersecurity authored by Richard Danzig titled “Surviving on a Diet of Poisoned Fruit: Reducing…
Just Security

White House Makes Reassuring Noises On 0-Day Policy

Yesterday afternoon, the White House put out a statement describing its view of vulnerability disclosure: the contentious issue of whether and when government agencies should disclose…
Just Security

Huawei Hacking is a Security Scandal

You probably won’t be surprised to learn that people who are neither naïve nor who hate freedom can reasonably disagree with Edward Lucas and his post from this morning…
Just Security

RightsCon, March 3-5, San Francisco

Further to all our coverage of the use and abuse of digital technologies, I commend RightsCon to our readers—a gathering of the Silicon Valley (and beyond) tech community, digital…
Just Security

Changes to Export Control Arrangement Apply to Computer Exploits and More

Last month, changes to the Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies (“Wassenaar Arrangement”) placed “zero-days,”…
Just Security

On Trees Falling Silently in Oversight Forests: Three Reflections on Yesterday’s HPSCI Hearing

Although it’s been overtaken by subsequent events, I thought I’d post some reflections on yesterday’s rare open hearing before the House Permanent Select Committee…
Just Security

Resolving Cyber-Related Ambiguities in the Law of War: A Reaction to Jensen

Many thanks to Eric Jensen for his excellent post on cyber issues, the use of force, and international law. The increasing number and sophistication of cyber attacks threatening…
Just Security

Resolving Cyber Issues Sets the State for Future Weapons

[A note from Ryan Goodman: On Monday, Professor Michael Schmitt helped launch Just Security with a Guest Post on the law of cyber conflict. Professor Eric Talbot Jensen accepted…
Just Security

Five Myths in the Debate about Cyber War

Between 2009 and 2013, a group of 20 public international law scholars and practitioners drafted the recently released Tallinn Manual on the International Law Applicable to Cyber…
1-9 of 357 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: