Cybersecurity
237 Articles

Meeting the Challenges of International Organizations’ New Threat Environment
Analysis of and recommendations for risk-mitigation planning, bolstering statutory immunity, international accountability, managing litigation & more.

NATO’s 2022 Strategic Concept Must Enhance Digital Access and Capacities
NATO must take steps to strengthen its resilience against hybrid threats.

Russian Threats and Cybersecurity: Q&A with Beth George, former DOD acting General Counsel
A conversation with former acting General Counsel of the Department of Defense.

Empowering Security Researchers Will Improve Global Cybersecurity
China's response to a software vulnerability last year sparked concerns for "white hat hackers." A deep dive into the tangled regulatory world of security researchers and how improved…

Opening Stages in UN Cybercrime Treaty Talks Reflect Human Rights Risks
The first session provided a valuable view into where States stand, what the convention may aim to achieve, and its political viability.

Friction, Framing & U.S. Cybersecurity-Related Actions Against Russia
Understanding the interagency effort, the imposition of costs on malign Russian cyber actors, and the shift from ordinary criminal to national security framework.

Expert Backgrounder: NATO Response Options to Potential Russia Cyber Attacks
Top cyber law expert explains NATO member states' legal options in event of different forms of Russian cyber attacks in wake of Ukraine invasion.

Foreign Disinformation: What the US Government Can Start Doing Now
Two recent commissions, while diagnosing the challenge differently, reached some similar conclusions on steps to take.

The Role for DHS in Countering the Disinformation Threat
DHS is well-placed to serve as the "truth-teller" to the American public.

On Ransomware, Cyber Command Should Take a Backseat
As concerns about ransomware grow, U.S. policymakers must resist temptations to over-militarize the U.S. response, instead developing cyber capabilities across a range of federal…

What the Afghanistan Withdrawal Teaches Us About Safeguarding Human Rights Evidence
As the Taliban seized control, evidence of human rights abuses had to be destroyed, hidden, or risk capture. It didn't have to be this way.

Client-Side Scanning: A New Front In the War on User Control of Technology
When technology has expanded to nearly every corner of our lives, how much control should users have over the devices they own?