Cybersecurity

Wed, Sep 27, 2023

Software Supply Chain Security: The Dataset

Want to dive deeper into the Breaking Trust database? You have come to the right place.

by Will Loomis, Stewart Scott, Trey Herr, Sara Ann Brackett, Nancy Messieh, and June Lee

Cybersecurity Software Supply Chains

Wed, Jul 19, 2023

Why Do SBOM Haters Hate? Or Why Trade Associations Say the Darndest Things

SBOMs are an important step forward for software supply chain security, so despite pushback and opposition, industry and government should take a page out of Taylor Swift’s book and just keep cruisin’, don’t let SBOM haters get in the way. 

by John Speed Meyers, Sara Ann Brackett, and Trey Herr

Cybersecurity Software Liability

Tue, Jul 18, 2023

The National Cybersecurity Strategy Implementation Plan: A CSI Markup

On July 13, the White House released the Implementation Plan for the 2023 US National Cybersecurity Strategy. Read along with CSI staff, fellows, and experts for commentary and what the NCSIP means for the Strategy.

by Trey Herr, Stewart Scott, Maia Hamin, Will Loomis, Sara Ann Brackett, Jennifer Lin

Cyber Strategy Cybersecurity

Mon, Jul 10, 2023

Critical Infrastructure and the Cloud: Policy for Emerging Risk

Critical infrastructure increasingly depends upon cloud computing. Policy must adapt its approach to risk management accordingly.

by Tianjiu Zuo, Justin Sherman, Maia Hamin, and Stewart Scott

Cloud Computing Cybersecurity

Wed, Jun 28, 2023

Shaping the global spyware market: Opportunities for transatlantic cooperation

The United States and its allies can do more to improve their position on spyware. Further policy action should, through greater collaboration with marketplace operators and allies and partners, work on furthering the development of norms and common understanding of what spyware can and cannot be used for.

by Jen Roberts and Emmeline Nettles

Cyber Strategy Cybersecurity
Scaling Trust on the Web

Fri, Jun 16, 2023

Task Force for a Trustworthy Future Web launches final report Scaling Trust on the Web

Press Release: Task Force for a Trustworthy Future Web launches final report Scaling Trust on the Web

Cybersecurity Digital Policy

Wed, Jun 14, 2023

Who’s Afraid of the SEC?

The SEC wants to require fast, public disclosure of cybersecurity incidents. These rules could benefit investors—and the cyber ecosystem.

by Maia Hamin

Cybersecurity Incidents, Vulnerabilities, and Information Sharing

Mon, May 15, 2023

What is driving the adoption of Chinese surveillance technology in Africa?

When examining the proliferation of Chinese surveillance systems and cyber capabilities in Africa, research disproportionately focuses on the motivations and ambitions of the supplier. This perspective, while it highlights Chinese diplomatic ambitions and corporate opportunities, ignores local features that drive the adoption of Chinese surveillance tools.

by Bulelani Jili

A Ukrainian artillery unit operates from muddy trenches near the frontline during heavy fighting close to Bakhmut, Ukraine, April 13, 2023. (Source: Reuters/Kai Pfaffenbach)

Fri, Apr 14, 2023

Russian War Report: Russian army presses on in Bakhmut despite losses

Bakhmut remains a major conflict zone with dozens of attacks on Ukrainian forces there, despite Russian forces sustaining heavy losses.

by Digital Forensic Research Lab

Wed, Mar 29, 2023

What to expect from the world’s democratic tech alliance as the Summit for Democracy unfolds

Ahead of the Biden administration’s second Summit for Democracy, stakeholders from the Freedom Online Coalition gave a sneak peek at what to expect on the global effort to protect online rights and freedoms.

by Katherine Walla

Wed, Mar 29, 2023

Wendy Sherman on the United States’ priorities as it takes the helm of the Freedom Online Coalition

US Deputy Secretary of State Wendy Sherman outlined the priorities for the world's democratic tech alliance, from protecting fundamental freedoms online to building resilience against digital authoritarianism.

by Atlantic Council

Mon, Feb 27, 2023

A Parallel Terrain: Public-Private Defense of the Ukrainian Information Environment

The information environment is a key domain through which the war in Ukraine is being contested. By better understanding the key role that private tech companies play in this domain, the USs and Ukraine can better prepare for future threats.

by Emma Schroeder and Sean Dack