Cyberattacks
76 Articles

The Era of AI-Orchestrated Hacking Has Begun: Here’s How the United States Should Respond
Policymakers and industry must ensure that organizations have access to fit-for-purpose cyber defenses and take steps to manage the proliferation of AI capabilities.

America’s Cyber Retreat Is Undermining Indo-Pacific Security
A "Cyber Shield" would enable the United States and its Indo-Pacific allies to attribute quickly, act collectively, and stem Beijing’s cyber coercion.

Securing Solar: Why the Next Great Infrastructure Risk Is Distributed
States and utility companies can act now to transform solar energy from a security liability into a resilient pillar of national power.

Will Victims of Cyber Attacks Soon Get Their Day in Court? Options for Accountability for Cyber Attacks
More cyber litigation will appear on the docket as pathways to legal accountability for unlawful State-sponsored cyber operations strengthen.

The Rome Statute in the Digital Age: Confronting Emerging Cyber Threats
For the Rome Statute to remain relevant, practitioners must understand how governments can deploy spyware to commit international crimes.

The Next Cyber Breach Will Not Wait: Why Congress Must Reauthorize CISA 2015
Passing the WIMWIG Act to renew CISA 2015 is vital to defend the foundations of U.S. cybersecurity and technological superiority.

The Just Security Podcast: Sen. Elissa Slotkin on a New Vision for American National Security
The Senator joins Tess Bridgeman and Ryan Goodman for a wide-ranging discussion on the future of national security and foreign policy.

Unlocking Justice: A Policy Roadmap for Victims of Spyware
To introduce accountability for cyberattacks, Congress should make it clear that U.S. courts are the right venue for spyware cases.

What It Takes to Stop the Next Salt Typhoon
A roadmap for the Trump administration to address cyber vulnerabilities that persist nearly a year after the Salt Typhoon intrusion.

Call Them What They Are: Time to Fix Cyber Threat Actor Naming
The Microsoft-CrowdStrike partnership on cyber threat actor naming conventions is welcome, but more comprehensive reform is needed to serve defenders and the public.

The Just Security Podcast: A Conversation with Jen Easterly — Cybersecurity at a Crossroads
How do leaders steer through cyber crises and chart a path forward? Jen Easterly unpacks challenges, breakthroughs, and lessons from the front lines of U.S. cybersecurity.

Confronting Gendered Harm in Cyberspace is not a Matter of Social Justice — It’s a National Security Imperative
Despite the worsening cyber threat landscape, U.N. cyber norms remain gender-blind, undermining States' ability to protect all citizens.