AI & Emerging Technology

Cyber

× Clear Filters
440 Articles

Call Them What They Are: Time to Fix Cyber Threat Actor Naming

The Microsoft-CrowdStrike partnership on cyber threat actor naming conventions is welcome, but more comprehensive reform is needed to serve defenders and the public.
The Just Security Podcast logo

The Just Security Podcast: A Conversation with Jen Easterly — Cybersecurity at a Crossroads

How do leaders steer through cyber crises and chart a path forward? Jen Easterly unpacks challenges, breakthroughs, and lessons from the front lines of U.S. cybersecurity.
The U.S. Capitol is seen after the House narrowly passed a bill forwarding President Donald Trump's agenda at the U.S. Capitol on May 22, 2025 in Washington, DC. (Photo by Kevin Dietsch/Getty Images)

AI Governance Needs Federalism, Not a Federally Imposed Moratorium

Congress should reject the proposed “AI preemption moratorium.” It is bad policy and is likely unconstitutional under the Tenth Amendment.
A collage of images featuring scenes from the Russia - Ukraine War.

Just Security’s Russia–Ukraine War Archive

A catalog of over 100 articles (many with Ukrainian translations) on the Russia Ukraine War -- law, diplomacy, policy options, and more.

Fireside Chat with Singapore’s Chief of Cybersecurity David Koh: Navigating the New Global Tech Order

Remarks from Singapore's Chief of Cybersecurity David Koh for the Just Security-Oxford Global Tech Policy Seminar Series.
Sen. Patrick Leahy sits in front of a poster with examples of Russian-created Facebook pages

Is the U.S. Abandoning the Fight Against Foreign Information Operations?

The Trump administration's policy shift paves the way for foreign propaganda to flourish, leaving Europe to step into the breach.
A group of Ukrainian women demonstrate against war rape, holding posters.

Ukraine’s Use of Technology in Sexual and Gender-Based Crimes Investigations

Technology can help bring justice for Ukrainian survivors of sexual and gender-based crimes, but the process is not without challenges.
Conceptual image of a laptop surrounded by cloud illustrations and being watched by security cameras

One Step Forward? Agreement on Spyware Regulation in the Pall Mall Process

A new code marks a serious commitment by states to regulate digital surveillance tools, but stops short of agreeing to hard legal standards.
Bitcoin cryptocurrency on the U.S. flag

How Congress Can Stop the Looming Crypto Disaster

Legislative and administrative accommodation of the crypto industry pose fundamental challenges to control over money and credit.
Image of the Capital overlayed with digital color blocks

Beyond Data Rescue: Building Structural Safeguards for Federal Data Preservation

Disappearance of vital resources from government websites exposes a fragile ecosystem in which accountability mechanisms have broken down.
gavel hammer with smartphone on blue background.

Online Safety Regulations Around the World: The State of Play and The Way Forward

A global survey and analysis of online safety laws reveals an emerging set of discernible approaches to platform regulation.
Trump's AI Strategy Takes Shape

The Just Security Podcast: Trump’s AI Strategy Takes Shape

Is a distinct Trump strategy for AI beginning to emerge—and what will that mean for the United States and the rest of the world?  
1-12 of 440 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: