Cybersecurity

× Clear Filters
237 Articles
A Luas tram heads for Dublin on December 2, 2010 near Cherrywood - south of Dublin, Ireland.

What the Dublin Tram System Hack Reveals about the Future of Hostage Taking

Imagine hackers commandeered a capital city’s transit system, holding it hostage for a cryptocurrency ransom. Consider the implications of this attack: beyond a data breach,…
Shanghai at night with an overlay of binary coding.

Weapons of Mass Consumerism: Why China Wants Your Personal Information

A new frontier in cyber insecurity is opening. Cyber powers, including China, are collecting and compiling data on private citizens, including Americans and other nationals. The…
Aerial photograph of the Government Communications Headquarters, also known as GCHQ, Cheltenham Gloucestershire.

Give Up the Ghost: A Backdoor by Another Name

Government Communications Headquarters (GCHQ,) the UK’s counterpart to the National Security Agency (NSA), has fired the latest shot in the crypto wars. In a post to Lawfare…

Russia’s Tightening Control of Cyberspace Within its Borders

Russian proposals to ban certain materials online and to block search engines that don’t comply with requests of state authorities highlight the need to beware of domestic policies…

The Huawei Arrest: How It Likely Happened and What Comes Next

The arrest and possible extradition of an executive of Chinese tech giant Huawei raises important questions about foreign policy cases and Justice Department autonomy.

Was Your Voting Machine Hacked? Without More User-Friendly Devices, We May Not Know

Election-technology monitoring during the midterms logged more than 900 individual reports of voting issues. But the problems weren’t the anticipated cyberattacks.

A Congressional Cybersecurity To-Do List

With a lame duck session pending, Congress may address a number of cybersecurity and data security issues before the end of the calendar year. Since it passed the “Cybersecurity…

Countering Russian Election Hacks

Explainer on the legal triggers, limits, and powers of Pentagon's new authority to prepare and conduct cyber response if Russia hacks into midterms votes.

Election Security is an Immediate National Security Concern

Democracy isn’t in the casting of the votes -- it’s in the counting. Georgia State Rep. Scott Holcomb says we need to ensure that our system is secure and every ballot is counted…

17 Years Later: Applying Post-9/11 Lessons to Potential Cyber Attacks

Seventeen years ago today, Americans learned all too tragically that, as the 9/11 Commission later put it, “the system was blinking red” for a reason. Our country, we came…

Election Interference Is Just a Symptom. Evaporation of Trust is the Disease.

We need to recognize our cognitive infrastructure, on which trust is built, as a critical national asset that’s crumbling, and we need to shore it up—fast. It’s a challenge…

Locking in Transparency on the Vulnerabilities Equities Process

Eight months ago, the White House released a charter for the Vulnerabilities Equities Process (VEP), the interagency mechanism by which the federal government decides whether to…
1-12 of 237 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: