A pair of recent cyberattacks demonstrate how adversaries are changing their strategies. Editor’s Note: The United…
POLICY & GOVERNANCE
Much of Congress’s cyber policy emerges from the annual National Defense Authorization Act (NDAA). What…
The U.S. position in the global value chain puts it at a disadvantage, and Washington’s…
National security agencies should turn their commitment to accountability in handling personal data into an…
AI self-regulation may not be enough. It’s time to consider licensing regimes that apply throughout…
A summary of the Executive Order on the Safe, Secure, and Trustworthy Development and Use…
Many proposed laws on encryption assume that children are harmed by the technology, but encryption…
As the Biden administration seeks to develop software liability legislation, consider a regime that incorporates…
Several models exist for an agreement, but reaching one will require navigating sovereignty and rule-of-law…
With FISA Section 702 soon set to expire, two Senate bills and a House report…