Cybersecurity
232 Articles

The Real National Security Betrayal Isn’t Who Leaves—It’s What Gets Dismantled
The real national security threat from the Trump administration's civil service purges isn’t who might go rogue—it’s the dismantling of the systems built to prevent betrayal.

Assessing the Trump Administration’s AI Action Plan
Unpacking the Trump administration's AI Action Plan — what’s new, what’s not, and what’s next.

Decoding Trump’s AI Playbook: The AI Action Plan and What Comes Next
Joshua Geltzer, Jenny Marron, and Sam Winter-Levy join Brianna Rosen on the Just Security podcast to discuss the Trump administration's AI Action Plan.

The Security Stakes in the Global Quantum Race
By acting early, states can build governance frameworks that support the responsible development and adoption of quantum technologies.

What It Takes to Stop the Next Salt Typhoon
A roadmap for the Trump administration to address cyber vulnerabilities that persist nearly a year after the Salt Typhoon intrusion.

Call Them What They Are: Time to Fix Cyber Threat Actor Naming
The Microsoft-CrowdStrike partnership on cyber threat actor naming conventions is welcome, but more comprehensive reform is needed to serve defenders and the public.

The Just Security Podcast: A Conversation with Jen Easterly — Cybersecurity at a Crossroads
How do leaders steer through cyber crises and chart a path forward? Jen Easterly unpacks challenges, breakthroughs, and lessons from the front lines of U.S. cybersecurity.

Open Questions for China’s Open-Source AI Regulation
China's accelerating wave of AI regulation makes one thing clear: the era of lightly-governed open-source AI in the country is ending.

Online Safety Regulations Around the World: The State of Play and The Way Forward
A global survey and analysis of online safety laws reveals an emerging set of discernible approaches to platform regulation.

Signal Gate: The Criminal Law Precedents That Are Most Relevant
A range of federal laws, including the Espionage Act and laws against the destruction of government records, could apply in this case.

“Fired” Member of U.S. Privacy Oversight Board Discusses What He Considers at Stake
"The risks to U.S. persons, as well as non-U.S. persons, from the misuse, abuse, and exfiltration of data are quite substantial."

The Munich Security Conference Provides an Opportunity to Improve on the AI Elections Accord
Ahead of the Munich Security Conference, one crucial issue is at risk of falling by the wayside: protecting democracy from abuses of AI.