(Editor’s Note: This article is part of the Just Security symposium “Thinking Beyond Risks: Tech…

(Editor’s Note: This article is part of the Just Security symposium “Thinking Beyond Risks: Tech…
Can regulators know when autonomous weapons systems are being used? Editor’s Note: For those eager to restrict the use of lethal autonomous weapons, one of the biggest challenges is verification—a difficult-to-detect variation in…
Estonia’s first public attribution of a cyberattack—four years after the fact—could be a turning point…
On Monday, editor-in-chief of The Atlantic Jeffrey Goldberg revealed that he had apparently been added…
Security was top of mind when Dr. Marcus Botacin, assistant professor in the Department of…
Policymakers should address algorithmic harms by prioritizing long-term user value instead of relying on overly simplistic solutions like mandating chronological feeds. In the United States, state and federal lawmakers have introduced more…
Sophos’s account of its recent active cyber defense campaign can help shape norms of “responsible…
Vance’s further details the administration’s AI vision at a16z summit: deregulation at home and protectionism…