Cybersecurity

× Clear Filters
241 Articles
A U.S. hacker sitting opposite of a Chinese hacker

America’s Cyber Retreat Is Undermining Indo-Pacific Security

A "Cyber Shield" would enable the United States and its Indo-Pacific allies to attribute quickly, act collectively, and stem Beijing’s cyber coercion.
U.S. Rep. Raja Krishnamoorthi (D-IL) (R) speaks as Rep. Joaquin Castro (D-TX) looks on

Questions Lawmakers Should Ask About Inspector General Report on Signalgate

The OIG report on the "Signalgate" incident is far from the “total exoneration” claimed by Hegseth and his aides.
In an aerial view, the Kayenta Solar Plant is seen

Securing Solar: Why the Next Great Infrastructure Risk Is Distributed

States and utility companies can act now to transform solar energy from a security liability into a resilient pillar of national power.
Lady Justice against laptop monitor

Will Victims of Cyber Attacks Soon Get Their Day in Court? Options for Accountability for Cyber Attacks

More cyber litigation will appear on the docket as pathways to legal accountability for unlawful State-sponsored cyber operations strengthen.
In this pool photograph distributed by the Russian state agency Sputnik, Russia's President Vladimir Putin chairs a Security Council meeting via a videoconference at the Kremlin in Moscow on July 25, 2025. (Photo by SERGEI ILYIN/POOL/AFP via Getty Images)

Russian Motivations Behind the “Hanoi Convention” Against Cybercrime

Russia’s cybercrime stance reflects a broader push to assert state control over the internet, restrict dissent, and build global backing for its governance model.
A faceless hacker running malware on a laptop

The Rome Statute in the Digital Age: Confronting Emerging Cyber Threats

For the Rome Statute to remain relevant, practitioners must understand how governments can deploy spyware to commit international crimes.
The Just Security Podcast

The Just Security Podcast: What Just Happened – CISA and the Fate of U.S. Cybersecurity

As CISA faces expiration, former FBI official Cynthia Kaiser joins David Aaron to discuss its importance and highlight the risks of failing to reauthorize it. 
Security padlock and circuit board

The Next Cyber Breach Will Not Wait: Why Congress Must Reauthorize CISA 2015

Passing the WIMWIG Act to renew CISA 2015 is vital to defend the foundations of U.S. cybersecurity and technological superiority.
A retro computer encircled by CCTV cameras

Legal Frameworks for Addressing Spyware Harms

Introducing a new series on accountability for spyware harms convened by the Atlantic Council in partnership with Just Security.
Visualization of a man in front of data

The Real National Security Betrayal Isn’t Who Leaves—It’s What Gets Dismantled

The real national security threat from the Trump administration's civil service purges isn’t who might go rogue—it’s the dismantling of the systems built to prevent betrayal.
U.S. President Donald Trump displays a signed executive order

Assessing the Trump Administration’s AI Action Plan

Unpacking the Trump administration's AI Action Plan — what’s new, what’s not, and what’s next.
The Just Security Podcast

Decoding Trump’s AI Playbook: The AI Action Plan and What Comes Next

Joshua Geltzer, Jenny Marron, and Sam Winter-Levy join Brianna Rosen on the Just Security podcast to discuss the Trump administration's AI Action Plan.
1-12 of 241 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: