Content
Mon, May 13, 2024
International Cyberspace & Digital Policy Strategy: AC Tech Programs Markup
On May 6, the Department of State released the United States International Cyberspace & Digital Policy Strategy. Read along with AC Tech Programs staff, fellows, and experts for commentary and analysis.
by Emma Schroeder, Graham Brookie, Raul Brens Jr., Emerson Brooking, Safa Shahwan Edwards, Trey Herr, Rose Jackson
Wed, May 1, 2024
The 5×5—The XZ Backdoor: Trust and Open Source Software
Open source software security experts share their insights into the XZ backdoor, and what it means for open source software security.
Wed, Feb 28, 2024
The 5×5—Alumni perspectives on Cyber 9/12 Strategy Challenge
Alumni of Cyber 9/12 Strategy Challenge share their experiences, and discuss the impact of such simulated exercises to prepare for real life cyber attacks.
Fri, Jan 26, 2024
The Great Despiser: The BSA, Memory Safety, and How to Make a Good Argument Badly
Memory-safe programming languages are in the cyber policy mainstream, but some hesitation remains. Looking at the arguments around memory safety is informative for larger cyber policy debates too.
Wed, Jan 24, 2024
The 5×5—Forewarned is forearmed: Cybersecurity policy in 2024
Members of the Cyber Statecraft Initiative team discuss the regulatory requirements and emerging technology they are closely following in 2024, and forewarn of the year ahead.
Fri, Dec 1, 2023
#AtlanticDebrief – How will the OSA be implemented? | A Debrief from Melanie Dawes
An #AtlanticDebrief with Ofcom Chief Executive Dame Melanie Dawes covering the Online Safety Act and regulatory guidance on illegal harms. In partnership with the Atlantic Council's Europe Center.
Mon, Oct 30, 2023
Homogeneity and Concentration in the Browser
Web browsers are the gateway to the internet. As browser developers replicate design features and concentrate around shared underlying technologies, they create cybersecurity risks with the potential to impact many internet users at once.
by Justin Sherman and Jessica Edelson
Fri, Oct 27, 2023
The 5×5—The Cybersecurity Implications of Artificial Intelligence
A group of experts with diverse perspectives discusses the intersection of cybersecurity and artificial intelligence.
by Maia Hamin and Simon Handler
Wed, Sep 27, 2023
Kink in the Chain: Eight Perspectives on Software Supply Chain Risk Management
Software supply chain attacks are popular, impactful, and are used to great effect by malicious actors. To dive deeper on this topic, we asked eight experts about these threats and how policymakers can help protect against them.
by Cyber Statecraft Initiative
Wed, Sep 27, 2023
Software Supply Chain Security: The Dataset
Want to dive deeper into the Breaking Trust database? You have come to the right place.
by Will Loomis, Stewart Scott, Trey Herr, Sara Ann Brackett, Nancy Messieh, and June Lee
Wed, Jul 19, 2023
Why Do SBOM Haters Hate? Or Why Trade Associations Say the Darndest Things
SBOMs are an important step forward for software supply chain security, so despite pushback and opposition, industry and government should take a page out of Taylor Swift’s book and just keep cruisin’, don’t let SBOM haters get in the way.
by John Speed Meyers, Sara Ann Brackett, and Trey Herr
Tue, Jul 18, 2023
The National Cybersecurity Strategy Implementation Plan: A CSI Markup
On July 13, the White House released the Implementation Plan for the 2023 US National Cybersecurity Strategy. Read along with CSI staff, fellows, and experts for commentary and what the NCSIP means for the Strategy.
by Trey Herr, Stewart Scott, Maia Hamin, Will Loomis, Sara Ann Brackett, Jennifer Lin