Learning From the Legacy of 18F
Learning From the Legacy of 18F

Although the government has terminated 18F—the team that modernized government tech—its legacy offers lessons for future digital services. In March, the U.S. government shut down 18F, the digital services team tasked with modernizing government…

Verifying Who Pulled the Trigger
Verifying Who Pulled the Trigger

Can regulators know when autonomous weapons systems are being used? Editor’s Note: For those eager to restrict the use of lethal autonomous weapons, one of the biggest challenges is verification—a difficult-to-detect variation in…

Inside the Fourth EU Cyber Sanctions Package
Inside the Fourth EU Cyber Sanctions Package

Estonia’s first public attribution of a cyberattack—four years after the fact—could be a turning point for EU cyber sanctions. On Jan. 27, the European Council imposed the EU’s fourth cyber sanctions package, which…

“Chatgpt” for Computer Security
“Chatgpt” for Computer Security

Security was top of mind when Dr. Marcus Botacin, assistant professor in the Department of Computer Science and Engineering at Texas A&M University, heard about large language models (LLMs) like ChatGPT. LLMs…

©2026 Global Cyber Security Report. Use Our Intel. All Rights Reserved. Washington, D.C.