Cybersecurity

× Clear Filters
237 Articles

Cybersecurity and the 2020 Census: Are We Prepared?

A U.S. Census Bureau employee uses a UNIVAC 1105 computer to tabulate data following the 1960 Census. Image: U.S. government via Wikimedia Commons. Just Security readers may find…
Locks on $100 bill with an internet browser overlaid.

Information Operations are a Cybersecurity Problem: Toward a New Strategic Paradigm to Combat Disinformation

A call to shift efforts against disinformation into a cyber security paradigm, and to forge collaboration between independent academic researchers and tech companies.

The Technicolor Zone of Cyberspace, Part 2

What did the UK attorney general say about the principle of sovereignty in cyberspace and countermeasures as a self-help remedy to cyber-enabled breaches of international law?
A graphic design of a person or android’s head in blue covered in lights depicting coding. Binary numbers run up and down the side of the page next to the person.

The Technicolor Zone of Cyberspace – Part I

Two leading experts on cyber law analyze the U.K. Attorney General's major speech on international law and cyber, delivered at Chatham House last month.

A Model for Improving Cooperation in Cyber – the Highway Safety Act?

A new piece of bipartisan legislation—the “Enhancing Grid Security through Public-Private Partnerships Act” (HR 5240)—was reported out of the House Energy and Commerce…

United Kingdom Att’y General’s Speech on International Law and Cyber: Key Highlights

On Wednesday, the United Kingdom’s Attorney General, Jeremy Wright, QC MP, gave a speech at Chatham House on the role of international law in cyberspace. It is the first official…

In Defense of Sovereignty in Cyberspace

This article is the latest in our Fog of Law series that examines the gray zones in international law and conflict that can be exploited by states. The series comes in advance…

Kompromising Congress?

"Given what appears to be the low level of information security on the Hill, we probably don't need to ask whether such information has been gathered by foreign intelligence services.…
A Boeing 737 MAX 7 taxis before its first flight at Renton Municipal Airport, on March 16, 2018 in Renton, Washington.

All Hands on Deck: Cyber Attacks Against Private Companies and International Law

Last Wednesday, reports surfaced that the U.S. aircraft manufacturer Boeing had been hit by a serious ransomware attack. A leaked internal memo suggested that some production equipment…

Outlook on International Cyber Norms: Three Avenues for Future Progress

“It’s high time to have a serious discussion about the international legal framework in which cyberwars take place,” UN Secretary General António Guterres said during his…

Microsoft, Ireland, and the Rest of the World

United States v. Microsoft will be practically significant for its effect on law enforcement’s ability to access data stored abroad, and it has the potential to be doctrinally…

A Checklist for Protecting Our Elections from Foreign Meddling

Vice President and General Counsel for Facebook Colin Stretch, General Counsel for Twitter Sean Edgett, and Senior Vice President and General Counsel for Google Kent Walker at…
1-12 of 237 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: