Cybersecurity

× Clear Filters
237 Articles
Artificial intelligence security cameras using facial recognition technology are displayed at a stand during the 14th China International Exhibition on Public Safety and Security at the China International Exhibition Center in Beijing on October 24, 2018. A few people sit at a small table in the booth chatting while others look at the displays on the walls.

One Thousand and One Talents: The Race for A.I. Dominance

Introduction The March 2016 defeat of “Go” world champion Lee Sedol by DeepMind, Alphabet’s artificially intelligent AlphaGo algorithm, will be remembered as a crucial turning…
A graphic illustration of Germany with a triangular grid pattern symbolizing virtual connections.

Germany’s Positions on International Law in Cyberspace Part II

Germany issues major statement on use of force and International Humanitarian Law in cyberspace, analyzed here by leading expert Professor Michael Schmitt.
A phone show the Garmin Connect software with an error message that reads, “Server Maintenance: Sorry, we are down for maintenance. Check back shortly.” and “We are currently experiencing an outage that affects Garmin.com and Garmin Connect. This outage also affects our call centers, and we are currently unable to receive any calls, emails, or online chats. We are working to resolve this issue as quickly as possible and apologize for this inconvenience.” A watch that is clearly not working and has a dark screen is shown next to the phone with these messages.

Germany’s Positions on International Law in Cyberspace Part I

Germany issues major statement on cyberspace and international law, analyzed here by leading expert Professor Michael Schmitt.
A view of three speakers on videochat during the Munich Security Conference (MSC) Special Edition: "Beyond Westlessness: Renewing Transatlantic Cooperation, Meeting Global Challenges". A person stands near a podium in front of the screen projector looking at the speakers on screen.

China’s Military Tech Ambitions – What’s the U.S.- EU Gameplan?

The US and EU have taken divergent approaches to Chinese tech advances - including military and dual-use tech. To maintain their alliance, they must synchronize their approach.…
A AFP journalist views a video on January 25, 2019, manipulated with artificial intelligence to potentially deceive viewers, or "deepfake" at his newsdesk in Washington, DC.

Protecting the Information Space in Times of Armed Conflict

What, if any, limits exist concerning digital information operations in armed conflict? Does the humanitarian legal framework adequately capture the protection needs that arise…
The flag of North Korea overlaid on binary numerical code.

The Latest North Korea Cyber Indictment Should Serve as a Model

Last week, the Biden administration’s Department of Justice (DOJ) announced its first major cyber-related indictment. An investigation long in the works, the indictment charges…
A lock highlighted in blue embedded on a computer chip has numbers written all over it.

A Key Step in Preventing a Future SolarWinds

Federal action is needed to establish a cloud security certification that can applies across the ecosystem of information and communications technology.
A 3D illustration of binary numbers in blue waves. The numbers look like electronic lights.

SolarWinds as a Constitutive Moment: A New Agenda for the International Law of Intelligence

The SolarWinds hack could trigger fundamental changes in legal thought and state practice. Asaf Lubin sets out what that agenda can and should look like.
A SolarWinds sign and logo sits on top of the SolarWinds office building in Brno in the Czech Republic.

Top Expert Backgrounder: Russia’s SolarWinds Operation and International Law

A legal analysis of whether the SolarWinds cyber hack violated international law, and the U.S. government's response options.
Trump and Putin’s silhouettes as they walk side-by-side.

“Strategic Silence” and State-Sponsored Hacking: The US Gov’t and SolarWinds

The absence to date of executive branch attribution and condemnation of the SolarWinds intrusions may be strategic silence—a tactic employed in the immediate aftermath of past…
The New Zealand flag on a computer screen with numbers running up and down over the flag.

New Zealand Pushes the Dialogue on International Cyber Law Forward

New Zealand becomes latest state to issue a statement of its views on international law in cyberspace.
An engineer-virologist looks at 24 well plates adherent cells monolayer infected with a Sars-CoV-2 virus.

COVID-19 and International Law Series: Vaccine Theft, Disinformation, the Law Governing Cyber Operations

Ongoing cyberattacks on vaccine production and distribution systems, such as those discovered by IBM yesterday, may threaten efforts to fight COVID-19. But do they break international…
1-12 of 237 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: