Liability for insecure software is already a reality. The question is whether Congress will step in to give it shape and a coherent legal structure.
Latest in Cyber Solarium Commission
The United States—along with its democratic allies—should increase representation at international standards bodies and actively monitor China’s coordinated efforts to advance particular technologies or actively promote authoritarian internet governance objectives.
Without a firm grasp on the potential for escalation, the United States will be unable to contain the fallout when assertive operations are conducted.
What are the challenges associated with developing a cyber strategy that specifically addresses the Department of Defense?
Cost Imposition Is the Point: Understanding U.S. Cyber Operations and the Strategy Behind Achieving Effects
The muddled discourse about cybersecurity continues to limit the ability of practitioners and scholars to have a constructive discussion about the core elements of strategy.
How should threats be measured?
Although the technology is different, the underlying contest exhibits all of the characteristics of traditional spy-versus-spy battles.
Globalization has left Western end-users at least partially dependent on capabilities and services provided by foreign vendors that may not be entirely trustworthy.
How to map a more effective security strategy for cloud computing.
Cyber insurance has grown into a multibillion-dollar global business. Regulators need to start paying serious attention and resolve the lack of clarity surrounding policies.