Understanding Cyber Market Failures
Understanding Cyber Market Failures

Crafting better cyber regulations requires a better understanding of market failures. When the United States government spots a market failure and decides to prevent a corporate merger or to break up an…

The Dangers of AI Sovereignty
The Dangers of AI Sovereignty

Nations are racing toward AI sovereignty, prioritizing military control over human welfare. We need a new path before it’s too late. A throughline connects recent statements on AI policy by the Trump…

Learning From the Legacy of 18F
Learning From the Legacy of 18F

Although the government has terminated 18F—the team that modernized government tech—its legacy offers lessons for future digital services. In March, the U.S. government shut down 18F, the digital services team tasked with modernizing government…

Verifying Who Pulled the Trigger
Verifying Who Pulled the Trigger

Can regulators know when autonomous weapons systems are being used? Editor’s Note: For those eager to restrict the use of lethal autonomous weapons, one of the biggest challenges is verification—a difficult-to-detect variation in…

Inside the Fourth EU Cyber Sanctions Package
Inside the Fourth EU Cyber Sanctions Package

Estonia’s first public attribution of a cyberattack—four years after the fact—could be a turning point for EU cyber sanctions. On Jan. 27, the European Council imposed the EU’s fourth cyber sanctions package, which…

©2025 Global Cyber Security Report. Use Our Intel. All Rights Reserved. Washington, D.C.