Cyberattacks
72 Articles

The Rome Statute in the Digital Age: Confronting Emerging Cyber Threats
For the Rome Statute to remain relevant, practitioners must understand how governments can deploy spyware to commit international crimes.

The Next Cyber Breach Will Not Wait: Why Congress Must Reauthorize CISA 2015
Passing the WIMWIG Act to renew CISA 2015 is vital to defend the foundations of U.S. cybersecurity and technological superiority.

The Just Security Podcast: Sen. Elissa Slotkin on a New Vision for American National Security
The Senator joins Tess Bridgeman and Ryan Goodman for a wide-ranging discussion on the future of national security and foreign policy.

Unlocking Justice: A Policy Roadmap for Victims of Spyware
To introduce accountability for cyberattacks, Congress should make it clear that U.S. courts are the right venue for spyware cases.

What It Takes to Stop the Next Salt Typhoon
A roadmap for the Trump administration to address cyber vulnerabilities that persist nearly a year after the Salt Typhoon intrusion.

Call Them What They Are: Time to Fix Cyber Threat Actor Naming
The Microsoft-CrowdStrike partnership on cyber threat actor naming conventions is welcome, but more comprehensive reform is needed to serve defenders and the public.

The Just Security Podcast: A Conversation with Jen Easterly — Cybersecurity at a Crossroads
How do leaders steer through cyber crises and chart a path forward? Jen Easterly unpacks challenges, breakthroughs, and lessons from the front lines of U.S. cybersecurity.

Confronting Gendered Harm in Cyberspace is not a Matter of Social Justice — It’s a National Security Imperative
Despite the worsening cyber threat landscape, U.N. cyber norms remain gender-blind, undermining States' ability to protect all citizens.

Austria’s Progressive Stance on Cyber Operations and International Law
Austria's position is likely to influence ongoing international efforts to establish norms and principles that govern State conduct in cyberspace, potentially leading to more robust…

Software Backdoor is a Wakeup Call for Cybersecurity
As shown by the xz backdoor, relying on luck is not a sustainable cybersecurity strategy when much of the world depends on secure software.

Key Questions in U.S. Cyber Attack on “Iranian Spy Ship”
What was the nature of the operation? How is Iran likely to respond? What are the implications for conflict escalation, or de-escalation?

Biden’s Executive Order on AI Gives Sweeping Mandate to DHS
The Biden administration's new executive order gives the DHS a wide-ranging portfolio of responsibilities related to artificial intelligence.