Rewind and Reconnoiter: When Will Guam Become a Priority?
“I would not have predicted just how poorly this defense of Guam effort would be executed by the Department of Defense over the past four years. When historians reflect on poor planning...
“I would not have predicted just how poorly this defense of Guam effort would be executed by the Department of Defense over the past four years. When historians reflect on poor planning...
When the 119th Congress convenes in January, it must modernize the U.S. government’s approach to cybersecurity. This is not only about defending our national security; it is about growing our economic...
New presidents bring new policies. But amid rapidly expanding cyber threats, steady leadership at the federal agencies charged with securing critical infrastructure is, well, critical. David Pekoske,...
As a new administration is poised to take charge in January 2025, it will face a markedly different threat landscape than its predecessor. The United States and its allies now confront an axis of authoritarians...
A bipartisan proposal should move forward despite Defense Department objections.
The next administration must do better on cyber than previous ones, two experts behind a new McCrary Institute and Cyberspace Solarium Commission 2.0 report argue.
A House committee last month passed a bill to codify in law the Joint Cyber Defense Collaborative (JCDC), a Cybersecurity and Infrastructure Security Agency (CISA) collaboration initiative. If signed into...
This series—featuring scholars from the Futures Lab, the International Security Program, and across CSIS—explores emerging challenges and opportunities that NATO is likely to confront after its 75th anniversary.
This series—featuring scholars from the Futures Lab, the International Security Program, and across CSIS—explores emerging challenges and opportunities that NATO is likely to confront after its 75th anniversary.
Deterring U.S. adversaries from attacking American infrastructure requires making clear that the United States can strike back in kind.
The Biden administration is boasting about its planned $13 billion investment in cybersecurity for federal civilian agencies, but the White House’s plans neglect essential programs, including foundational research and standards setting...
The exponential growth in connected and automated systems has increased the demand for the sensor technology necessary to make them operate safely. Light detection and ranging, or lidar, is...
When it comes to cybersecurity and Communist China, Microsoft needs to get its act together — and so does the American government. ...
The Federal Communications Commission (FCC) earlier this month approved the U.S. Cyber Trust Mark program, a voluntary cybersecurity labeling initiative for Internet of Things (IoT) devices. This much-needed...
The Greek legend of the Trojan horse is a tale of deception, a story children everywhere learn as youngsters. Yet America seems to have forgotten what befell Troy, and, consequently, has instead welcomed Trojan...
Iran has dramatically stepped up its cyberattacks against the United States since Oct. 7, prompting little to no response from the White House. Like the rockets, drones and anti-ship missiles from Tehran’s...
Fine-tuned sensors let farmers know which fields need more water and which crops need more fertilizer. But today, a hacker halfway around the world, working as a criminal actor or paid by a foreign government,...
The Biden administration wants to avoid the Israel-Hamas war sparking a wider regional conflict, but Iran hasn’t gotten the message. While U.S. intelligence claims Iran wants to avoid a larger...
China’s cyber capabilities pose a greater threat to U.S. interests than ever before, according to a new Pentagon report on Chinese military power. Worse, according to the report, the Chinese...
A long overdue policy change to improve corporate governance on cybersecurity is taking effect. At the end of July, the Securities and Exchange Commission adopted new rules requiring...