The field has certainly grown apace producing countless case studies highlighting examples of influence operations. Yet in many other ways the field has hit a rut.
Latest in Cyber & Technology
Just five years ago, in September 2016, a significant change in the operation of the internet occurred.
In developing a system for preventing the spread of child sexual abuse material that involves scanning the material of all those using certain apps, Apple is acclimatizing the idea of bulk surveillance.
To make progress on supply chain security, the U.S. government will need to clarify its goals; create a cohesive, forward-thinking strategy; and offer alternatives to a cold divestment of Chinese ICT products.
The $600 million hack of the “decentralized” Poly Network should alert regulators due not to the size of the theft but, rather, to what the stakeholders did after the incident.
Technical standards set the foundation for billions of devices and systems used daily. Congress has focused on international standards bodies in several provisions of the Senate-passed United States Competition and Innovation Act.
Ransomware amounts to an ongoing tax by foreign gangs on U.S. governments and industry. If U.S. companies are going to pay extortionate taxes to foreign non-state entities, they should at least have to file a tax return.
Outdated Ethics Rules May Be Stymieing the Federal Trade Commission’s Efforts to Keep Up with Big Tech
Do the FTC’s longstanding conflict-of-interest rules unnecessarily impede the agency’s ability to attract, retain and deploy technical expertise that it badly needs?
The U.K. government's long-awaited Online Safety Bill was published on May 12. What does it say?
Title II classification of broadband would have offered significant consumer protections during the pandemic. However, net neutrality regulations take into account the actions of only internet service providers, which represent just one piece of a larger internet ecosystem.