In 2016, Germany created its military cyber command. But legal restrictions could ultimately decrease its flexibility and operational effectiveness.
Latest in Cybersecurity and Deterrence
The United States—along with its democratic allies—should increase representation at international standards bodies and actively monitor China’s coordinated efforts to advance particular technologies or actively promote authoritarian internet governance objectives.
What are the challenges associated with developing a cyber strategy that specifically addresses the Department of Defense?
Within the Department of Defense, terms such as “information warfare” and “psychological operations” have elastic and ambiguous meanings. What does this reveal about the Department’s approach to non-kinetic operations?
The Cyberspace Solarium Commission report can be added to the list of evidence that change in U.S. national cybersecurity thinking—although neither linear nor easy—is occurring.
A response to Ben Jensen on persistent engagement.
The very thing that makes advanced weapons systems so lethal is what makes them vulnerable to cyberattacks: an interconnected system of software and networks.
Why is cyber talent such an important and yet challenging obstacle for U.S. cyber strategy?
One of the Cyberspace Solarium Commission’s key recommendations is to ensure the Cyber Mission Force achieves the appropriate resourcing, force size and capability mix.
Last week, the Defense Department’s general counsel gave a speech setting forth the department’s current position on the laws applicable to military operations in cyberspace. Here’s what you need to know.