2025 Annual Report on Implementation
...
...
Guidance Based on the Experience of the Cyberspace Solarium Commission ...
Iranian Regime Crypto Exchange Hacked: A group of anti-Iran hackers known as Gonjeshke Darande, meaning Predatory Sparrow in Farsi, destroyed nearly $90 million worth of cryptocurrency...
This week marks the five-year anniversary of the release of the Cyberspace Solarium Commission’s original March 2020 report, a blueprint that has reshaped U.S. cybersecurity strategy and policymaking....
Assessing Global Cyber Threats to the Homeland
When the 119th Congress convenes in January, it must modernize the U.S. government’s approach to cybersecurity. This is not only about defending our national security; it is about growing our economic...
...
Deterring U.S. adversaries from attacking American infrastructure requires making clear that the United States can strike back in kind.
China-Linked Influence Operation Endures Despite Takedowns
Fine-tuned sensors let farmers know which fields need more water and which crops need more fertilizer. But today, a hacker halfway around the world, working as a criminal actor or paid by a foreign government,...
A Playbook for Continuity of the Economy Planning and Implementation
China is the biggest winner from the current train wreck that is the Marshall Islands–United States COFA negotiations.
Two Republican lawmakers sent a letter to President Joe Biden earlier this month expressing concern about the “limited action” the administration has taken to create plans to ensure the Continuity of...
CommonSpirit Health, the second-largest non-profit hospital chain in the United States, suffered a ransomware attack last week. The latest in a string of cyberattacks against the healthcare and public health...
In two separate letters last month, members of Congress urged President Joe Biden to develop a strategy for creating and implementing a Continuity of the Economy (COTE) plan, which would aim to ensure the...
The Cyberspace Administration of China (CAC) closed public feedback last month on a draft regulation to secure and manage data according to its importance to national security. While ostensibly a technical...