Cyberattacks

× Clear Filters
76 Articles
Visualization of floating programming code windows on a glowing cyber grid

The Era of AI-Orchestrated Hacking Has Begun: Here’s How the United States Should Respond

Policymakers and industry must ensure that organizations have access to fit-for-purpose cyber defenses and take steps to manage the proliferation of AI capabilities.
A U.S. hacker sitting opposite of a Chinese hacker

America’s Cyber Retreat Is Undermining Indo-Pacific Security

A "Cyber Shield" would enable the United States and its Indo-Pacific allies to attribute quickly, act collectively, and stem Beijing’s cyber coercion.
In an aerial view, the Kayenta Solar Plant is seen

Securing Solar: Why the Next Great Infrastructure Risk Is Distributed

States and utility companies can act now to transform solar energy from a security liability into a resilient pillar of national power.
Lady Justice against laptop monitor

Will Victims of Cyber Attacks Soon Get Their Day in Court? Options for Accountability for Cyber Attacks

More cyber litigation will appear on the docket as pathways to legal accountability for unlawful State-sponsored cyber operations strengthen.
A faceless hacker running malware on a laptop

The Rome Statute in the Digital Age: Confronting Emerging Cyber Threats

For the Rome Statute to remain relevant, practitioners must understand how governments can deploy spyware to commit international crimes.
Security padlock and circuit board

The Next Cyber Breach Will Not Wait: Why Congress Must Reauthorize CISA 2015

Passing the WIMWIG Act to renew CISA 2015 is vital to defend the foundations of U.S. cybersecurity and technological superiority.
The Just Security Podcast

The Just Security Podcast: Sen. Elissa Slotkin on a New Vision for American National Security

The Senator joins Tess Bridgeman and Ryan Goodman for a wide-ranging discussion on the future of national security and foreign policy.
Visualization of cybersecurity

Unlocking Justice: A Policy Roadmap for Victims of Spyware

To introduce accountability for cyberattacks, Congress should make it clear that U.S. courts are the right venue for spyware cases.
Visualization of cybersecurity

What It Takes to Stop the Next Salt Typhoon

A roadmap for the Trump administration to address cyber vulnerabilities that persist nearly a year after the Salt Typhoon intrusion.

Call Them What They Are: Time to Fix Cyber Threat Actor Naming

The Microsoft-CrowdStrike partnership on cyber threat actor naming conventions is welcome, but more comprehensive reform is needed to serve defenders and the public.
The Just Security Podcast logo

The Just Security Podcast: A Conversation with Jen Easterly — Cybersecurity at a Crossroads

How do leaders steer through cyber crises and chart a path forward? Jen Easterly unpacks challenges, breakthroughs, and lessons from the front lines of U.S. cybersecurity.
Digital generated image of multi coloured data against black background.

Confronting Gendered Harm in Cyberspace is not a Matter of Social Justice — It’s a National Security Imperative

Despite the worsening cyber threat landscape, U.N. cyber norms remain gender-blind, undermining States' ability to protect all citizens.
1-12 of 76 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: