The new challenge is to figure out what adversaries are allowed to do in cyberspace, not what they’re not allowed to do.
Latest in Cybersecurity and Deterrence
Deterrence needs to move out of the theoretical plane and into the real world.
Clarifying the art of the possible might be the operation’s real lasting success.
What’s in the new offensive cyber doctrine that France unveiled in February?
The concept of agreed competition allows for robust academic and policy analysis that, hopefully, will allow competition in cyberspace to evolve into a stable arena of global politics.
Debates about cyber attribution already divide the U.S. policy process. NATO is at risk of the same problem.
Today the Brookings Institution is publishing our edited volume, "Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations." And here is
How resilient is the global financial system to cyber threats?
The cyber indictment strategy is a central element of the U.S. response to the ravages of theft and destruction by China. There’s one catch: it doesn’t seem to be working.
What would it mean if “hacking back” was interpreted as violating the CFAA?