Cyberattacks

× Clear Filters
72 Articles
A constellation of Elon Musk's SpaceX Starlink satellites fly above Zaporizhzhia

Digital Tech Companies in War: What is the Law? What are the Risks?

Tech companies need to be familiar with IHL to protect their employees, properties, and surrounding civilians during armed conflict.
Computer code with individual words highlighted different colors.

Bugs in the Software Liability Debate

In the debate over software liability, a negligence standard requires research and must not lean only on avoiding "known vulnerabilities."
Futuristic data screen and hologram world map

The Year of Section 702 Reform, Part I: Backdoor Searches

Requiring a warrant for U.S. person queries honors the balance between security and liberty struck in the Fourth Amendment and ensures that Section 702 can’t be used to get around…
Blue futuristic monitor with information data

Poland’s Position on International Law and Cyber Operations: Sovereignty and Third-Party Countermeasures

Poland's positions push the discussion forward on contested areas of law.
Futuristic digital circuit background with a glowing dotted and line.

Regulating Artificial Intelligence Requires Balancing Rights, Innovation

"The United States should do what it has done for generations now when it comes to innovative thought and be a world leader ensuring AI supports society by providing the most benefits…
Futuristic, blue server room with the flowing people and data.

AcidRain Malware and Viasat Network Downtime in Ukraine: Assessing the Cyber War Threat

Russia's disruption of the Viasat network in Ukraine should be a wakeup call for policymakers.
A laptop displays a message after being infected by a ransomware as part of a worldwide cyberattack on June 27, 2017 in Geldrop.

Empowering Security Researchers Will Improve Global Cybersecurity

China's response to a software vulnerability last year sparked concerns for "white hat hackers." A deep dive into the tangled regulatory world of security researchers and how improved…

Expert Backgrounder: NATO Response Options to Potential Russia Cyber Attacks

Top cyber law expert explains NATO member states' legal options in event of different forms of Russian cyber attacks in wake of Ukraine invasion.
Horizontal image of two hands on keyboard of a type favored by hackers, with keyboard backlit by red-orange glow.

On Ransomware, Cyber Command Should Take a Backseat

As concerns about ransomware grow, U.S. policymakers must resist temptations to over-militarize the U.S. response, instead developing cyber capabilities across a range of federal…
Russian President Vladimir Putin greets US President Joe Biden with a handshake during the US - Russia Summit 2021 at the La Grange Villa near the Geneva Lake, on June, 16, 2021, in Geneva, Switzerland.

International Law’s Role in Combating Ransomware?

International law has an important role to play in cyberspace, but with regard to the ostensible rules of sovereignty and cyber due diligence, the United States should continue…
Biden and Putin sit in chairs in front of the American and Russian flags in a library. June 16, 2021

Three International Law Rules for Responding Effectively to Hostile Cyber Operations

Express endorsement of three legal policy positions would go far in ensuring the door to effective cyber responses is open.
Jen Easterly, nominee to be the Director of the Homeland Security Cybersecurity and Infrastructure Security Agency, and Chris Inglis, nominee to be the National Cyber Director, testify during their confirmation hearing before the Senate Homeland Security and Governmental Affairs Committee on June 10, 2021 in Washington, DC.

Four Key Takeaways from the Senate’s Cybersecurity Confirmation Hearing

There were approximately 65,000 ransomware attacks last year in the United States, and that number doesn’t seem to be slowing down. Over the past few weeks, cybersecurity has…
1-12 of 72 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: