Technology

× Clear Filters
265 Articles
U.S. President Donald Trump (R) and Chinese President Xi Jinping (L) sit across from each other at a long table, each flanked on the right and left side of the image, respectively, by other officials, with three flags each of the United States and China, alternating along the back wall at the far end of the table.

Trump’s Chip Strategy Needs Recalibration

Facing the challenge from China, U.S. technological leadership in the century ahead requires a focused and disciplined strategy coordinated with allies.
A photo of the clouds and sun

As Solar Geoengineering Enters its Startup Phase, Governments Must Address Emerging Security Risks

Without regulation, the dangers of solar radiation modification will become magnified and the security risks more unchecked.
Delegates pose for photos at the signing ceremony of the United Nations Convention against Cybercrime

The Promise and Peril of the U.N. Convention Against Cybercrime

It is up to democracies to ensure that repressive regimes do not abuse the new U.N. Cybercrime Convention to undermine fundamental freedoms.
In an aerial view, the Kayenta Solar Plant is seen

Securing Solar: Why the Next Great Infrastructure Risk Is Distributed

States and utility companies can act now to transform solar energy from a security liability into a resilient pillar of national power.
A billboard shows a caricature of Russian President Vladimir Putin pulling the ropes of then-fugitive oligarchs Ilan Shor (R) and Vladimir Plahotniuc (L), as if they are puppets, above words reading "They ask for your vote." The billboard was displayed in Ungheni city on September 24, 2025. (Photo by DANIEL MIHAILESCU/AFP via Getty Images)

How Tech Platforms Allowed Russia Into Moldova: Lessons for the EU and Others

What played out across social media throughout Moldova's recent election exposed how easily disinformation fills the gaps between state regulation and platform indifference. 
Lady Justice against laptop monitor

Will Victims of Cyber Attacks Soon Get Their Day in Court? Options for Accountability for Cyber Attacks

More cyber litigation will appear on the docket as pathways to legal accountability for unlawful State-sponsored cyber operations strengthen.
A faceless hacker running malware on a laptop

The Rome Statute in the Digital Age: Confronting Emerging Cyber Threats

For the Rome Statute to remain relevant, practitioners must understand how governments can deploy spyware to commit international crimes.
Visualization of a brain and artificial intelligence

AI’s Hidden National Security Cost

Generative AI is being integrated across the federal workplace, but efficiency gains risk weakening national security professionals’ critical thinking and judgment.
The United States, China and Taiwan on a blue world map

Dueling Strategies for Global AI Leadership? What the U.S. and China Action Plans Reveal

The U.S.-China AI rivalry raises urgent questions for global stability, intensifying fragmentation, chip chokepoints and global AI governance.
A CPU on Chinese and American flags

Selling AI Chips Won’t Keep China Hooked on U.S. Technology

Selling American chips alone will not create a lasting “addiction,” but it will provide China with the building blocks for AI competitiveness.
U.S. and Chinese flags with CPU in the background

The AI Action Plans: How Similar are the U.S. and Chinese Playbooks?

Despite different rhetoric, Washington's & Beijing's AI Action Plans converge on the need to advance AI adoption, expand diffusion, & manage risks.
Visualization of cybersecurity

Unlocking Justice: A Policy Roadmap for Victims of Spyware

To introduce accountability for cyberattacks, Congress should make it clear that U.S. courts are the right venue for spyware cases.
1-12 of 265 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: