Cybersecurity and Infrastructure Security Agency

January 5, 2026 | Jim Langevin, RADM (Ret.) Mark Montgomery

Time to restore America’s cyberspace security system

China’s campaign to break into our critical infrastructure and federal government networks is persistent and growing. Beijing is stealing information while also planting tools and maintaining access...

December 16, 2025 | RADM (Ret.) Mark Montgomery |

How the New National Security Strategy Misses the Mark on Cybersecurity

To combat China and Russia’s cyber capabilities, the Trump administration must stop eliminating cybersecurity professionals and invest in federal programs that protect domestic critical infrastructure.

December 16, 2025 | Jack Burnham, Annie Fixler, Craig Singleton

Advancing IP Interconnection

November 13, 2025 | Jack Burnham, Jiwon Ma

Using Shutdown as Cover, Suspected Chinese Hackers Target the Congressional Budget Office

While President Donald Trump raved about his meeting with Chinese paramount leader Xi Jinping in South Korea on October 30, it was business as usual for Beijing, targeting Washington’s secrets and security...

October 22, 2025 | Jiwon Ma, RADM (Ret.) Mark Montgomery

2025 Annual Report on Implementation

...

October 17, 2025 | Samantha Ravich, Johanna Yang, Jack Burnham

Section 232 National Security Investigation of Imports of Personal Protective Equipment, Medical Consumables, and Medical Equipment, Including Devices

October 17, 2025 | Jack Burnham |

The U.S. Will Rely on China To Defend Against the Next Pandemic

Despite the lessons of the pandemic, America’s biodefense system increasingly relies on Chinese components. On October 14, the U.S. Pharmacopeia (USP), a body that sets domestic quality standards for...

October 7, 2025 | Leah Siskind |

Lawmakers ‘Bullseye and Bait’ in AI-Driven Deepfake Campaigns

Elected officials are both the bullseye and the bait for AI-driven influence campaigns launched by foreign adversaries. They are targeted with disinformation meant to sway their opinions and votes, while...

September 9, 2025 | Sophie McDowall |

Protecting U.S. Ports Requires Congress to Get Cyber-Specific

Cranes are a crucial part of the supply chain that keeps shelves stocked across the United States; but who controls them, American operators or Chinese hackers? Congress is currently working its way through...

September 9, 2025 | Jack Burnham |

Looking for an Edge in Trade Talks, Chinese Hackers Go Phishing Against Key House Committee

The chairman of the House China Select Committee and an outspoken critic of Beijing, Rep. John Moolenaar (R-MI), appeared to be soliciting input about upcoming U.S.-China trade talks from Capitol Hill...

September 9, 2025 | RADM (Ret.) Mark Montgomery, Dr. Erica Lonergan, Joe Dougherty

Building the Future U.S. Cyber Force

What Right Looks Like

September 3, 2025 | Sophie McDowall, RADM (Ret.) Mark Montgomery

Cutting Cyber Intelligence Undermines National Security

America’s cyber intelligence capabilities are being eviscerated while the threats to national security emanating from cyber space are increasing. The latest cuts to the cyber capabilities within the...

August 28, 2025 | RADM (Ret.) Mark Montgomery, Annie Fixler

5 Urgent Tasks for the New National Cyber Director

The new chief of U.S. cyber policymaking, Sean Cairncross, brings to the table extensive experience gained as a former adviser to the White House chief of staff and CEO of the Millennium Challenge Corporation,...

August 17, 2025 | RADM (Ret.) Mark Montgomery, Sophie McDowall

Washington limits states’ access to critical cyber resources

President Donald Trump wants to push state and local entities to take more ownership of their cybersecurity, but his administration is simultaneously dismantling the resources that state and...

August 1, 2025 | Leah Siskind, Maria Riofrio, Mariam Lomtadze

Russian Cyber Threat Group Uses AI-Guided Malware

Hackers are now using AI to guide attacks in real time. In a statement that initially attracted little attention among Western analysts, Ukraine’s national cybersecurity agency warned on July 17 that...

July 29, 2025 | Jiwon Ma, Meera Hatangadi

The Global Cyber Vulnerability Database Cannot Run on Unstable Funding

A critical cybersecurity system that supports global threat coordination operates without guaranteed funding, statutory authority, or a formal governance structure. The Common Vulnerabilities and Exposures...

July 17, 2025 | Jiwon Ma, Stefan Videnovic

U.S. Rail Systems at Risk After Industry Ignored Decades-Old Cybersecurity Vulnerabilities

U.S. rail system controls are not safe. While industry slept, security researchers discovered decades ago that hackers can remotely access the radio communications equipment that controls a train’s braking...

July 9, 2025 | Annie Fixler, Stefan Videnovic

U.S. Cybersecurity at Risk Without Congressional Action

Congress has less than 90 days to avert a cybersecurity nightmare. At the end of September, a keystone law enabling information sharing between private companies and government and among private companies...

July 1, 2025 | |

Iranian Hacker Group Threatens to Release Trove of Emails from Top Aides to Trump

Hackers Threaten Email Leaks From Trump Aides: Iranian hackers are threatening to leak private emails obtained from top aides to President Donald Trump, the Cybersecurity and Infrastructure...

June 30, 2025 | Jack Burnham, Johanna Yang

Chinese Scholars Probe for Weaknesses in Western Electricity Grids

Chinese academics are taking a keen interest in the vulnerabilities of America’s energy grid. On June 19, the Czech Technical University in Prague published a paper revealing that Chinese scholars are...