Content

A glowing blue 'AI' letter against a dark background with circuit board patterns and purple accents. The image conveys a technological and official government document theme.

Fri, Jan 17, 2025

National Security Memorandum (NSM) on Artificial Intelligence: Democracy + Tech Initiative Markup

On October 24, 2024, the Biden Administration released its National Security Memorandum (NSM) on Artificial Intelligence. Read along with AC Tech Programs staff, fellows, and industry experts for commentary and analysis.

United States and Canada

Thu, Dec 19, 2024

The Eight Body Problem: Exploring the Implications of Salt Typhoon 

The Cyber Statecraft community and friends offer their thoughts on the implications of the Salt Typhoon campaign based on what is known to date, what the campaign says about the last four years of cybersecurity policy, and where policymakers should focus in the months ahead.

by Cyber Statecraft Team

Critical Infrastructure Policy Cybersecurity

Wed, Nov 20, 2024

Seizing the Win: Navigating Competition and Hands-on Learning through Cyber 9/12 

Competitors and judges from the inaugural Cyber 9/12 Strategy Challenge in Costa Rica share their perspectives on how to leverage teamwork and interdisciplinary skills to address tomorrow’s cyber challenges.

by Safa Shahwan Edwards, Emerson Johnston

Cyber 9/12 Strategy Challenge Developing the Cyber Workforce

Tue, Oct 29, 2024

A Conversation with Věra Jourová: Lessons from EU Election Interference 

Assessing lessons learned from information interference operations during the European Parliament elections.

by Digital Forensic Research Lab

Disinformation Elections
CSI_ 5X5_CISOs and senior cybersecurity executives

Wed, Oct 23, 2024

The 5×5—The evolving role of CISOs and senior cybersecurity executives

For this Cybersecurity Awareness Month, senior cybersecurity executives share their insights into the evolution of their roles.

by Nitansha Bansal

Cybersecurity Cybersecurity Standards and Requirements

Mon, May 13, 2024

International Cyberspace & Digital Policy Strategy: AC Tech Programs Markup

On May 6, the Department of State released the United States International Cyberspace & Digital Policy Strategy. Read along with AC Tech Programs staff, fellows, and experts for commentary and analysis.

by Emma Schroeder, Graham Brookie, Raul Brens Jr., Emerson Brooking, Safa Shahwan Edwards, Trey Herr, Rose Jackson

Artificial Intelligence Cyber Strategy

Wed, May 1, 2024

The 5×5—The XZ Backdoor: Trust and Open Source Software

Open source software security experts share their insights into the XZ backdoor, and what it means for open source software security.

by Nitansha Bansal, Stewart Scott

Cybersecurity Open Source Software

Wed, Feb 28, 2024

The 5×5—Alumni perspectives on Cyber 9/12 Strategy Challenge

Alumni of Cyber 9/12 Strategy Challenge share their experiences, and discuss the impact of such simulated exercises to prepare for real life cyber attacks.

by Nitansha Bansal, Isabella Wright

Cyber 9/12 Strategy Challenge Cybersecurity

Fri, Jan 26, 2024

The Great Despiser: The BSA, Memory Safety, and How to Make a Good Argument Badly

Memory-safe programming languages are in the cyber policy mainstream, but some hesitation remains. Looking at the arguments around memory safety is informative for larger cyber policy debates too.

by Stewart Scott

Cybersecurity Software Supply Chains

Wed, Jan 24, 2024

The 5×5—Forewarned is forearmed: Cybersecurity policy in 2024

Members of the Cyber Statecraft Initiative team discuss the regulatory requirements and emerging technology they are closely following in 2024, and forewarn of the year ahead.

by Nitansha Bansal, Trey Herr

Artificial Intelligence Conflict in and through the Cyber Domain
#AtlanticDebrief - How will the OSA be implemented? | A Debrief from Melanie Dawes

Fri, Dec 1, 2023

#AtlanticDebrief – How will the OSA be implemented? | A Debrief from Melanie Dawes

An #AtlanticDebrief with Ofcom Chief Executive Dame Melanie Dawes covering the Online Safety Act and regulatory guidance on illegal harms. In partnership with the Atlantic Council's Europe Center.

by Digital Forensic Research Lab

Cyber Strategy Digital Policy
An image of browser icons for Edge, Firefox, Chrome, Opera, and Brave browsers

Mon, Oct 30, 2023

Homogeneity and Concentration in the Browser

Web browsers are the gateway to the internet. As browser developers replicate design features and concentrate around shared underlying technologies, they create cybersecurity risks with the potential to impact many internet users at once.

by Justin Sherman and Jessica Edelson

Cybersecurity Telecomms and the Internet