Cybersecurity

× Clear Filters
232 Articles
Visualization of a man in front of data

The Real National Security Betrayal Isn’t Who Leaves—It’s What Gets Dismantled

The real national security threat from the Trump administration's civil service purges isn’t who might go rogue—it’s the dismantling of the systems built to prevent betrayal.
U.S. President Donald Trump displays a signed executive order

Assessing the Trump Administration’s AI Action Plan

Unpacking the Trump administration's AI Action Plan — what’s new, what’s not, and what’s next.
The Just Security Podcast

Decoding Trump’s AI Playbook: The AI Action Plan and What Comes Next

Joshua Geltzer, Jenny Marron, and Sam Winter-Levy join Brianna Rosen on the Just Security podcast to discuss the Trump administration's AI Action Plan.
Visualization of quantum technology

The Security Stakes in the Global Quantum Race

By acting early, states can build governance frameworks that support the responsible development and adoption of quantum technologies.
Visualization of cybersecurity

What It Takes to Stop the Next Salt Typhoon

A roadmap for the Trump administration to address cyber vulnerabilities that persist nearly a year after the Salt Typhoon intrusion.

Call Them What They Are: Time to Fix Cyber Threat Actor Naming

The Microsoft-CrowdStrike partnership on cyber threat actor naming conventions is welcome, but more comprehensive reform is needed to serve defenders and the public.
The Just Security Podcast logo

The Just Security Podcast: A Conversation with Jen Easterly — Cybersecurity at a Crossroads

How do leaders steer through cyber crises and chart a path forward? Jen Easterly unpacks challenges, breakthroughs, and lessons from the front lines of U.S. cybersecurity.
CPU with Chinese flag

Open Questions for China’s Open-Source AI Regulation

China's accelerating wave of AI regulation makes one thing clear: the era of lightly-governed open-source AI in the country is ending.
gavel hammer with smartphone on blue background.

Online Safety Regulations Around the World: The State of Play and The Way Forward

A global survey and analysis of online safety laws reveals an emerging set of discernible approaches to platform regulation.
Central Intelligence Agency Director John Ratcliffe (R), accompanied by FBI Director Kash Patel (L), and Director of National Intelligence Tulsi Gabbard (C)

Signal Gate: The Criminal Law Precedents That Are Most Relevant

A range of federal laws, including the Espionage Act and laws against the destruction of government records, could apply in this case.
photograph of Travis LeBlanc speaking into a microphone.

“Fired” Member of U.S. Privacy Oversight Board Discusses What He Considers at Stake

"The risks to U.S. persons, as well as non-U.S. persons, from the misuse, abuse, and exfiltration of data are quite substantial."
Voter Bots And Human Voters as an AI Bot voting and robots Election votes as Artificial intelligence using autonomous voter technologies disrupting elections as computer democracy as a robot vote casting ballots.

The Munich Security Conference Provides an Opportunity to Improve on the AI Elections Accord

Ahead of the Munich Security Conference, one crucial issue is at risk of falling by the wayside: protecting democracy from abuses of AI. 
1-12 of 232 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: