A major Japanese beverage producer says it has been hit by a cyberattack that left…
STRATEGY & THREATS
Authoritarian threats, coupled with ongoing corporate surveillance, demand that we rethink how we use digital…
Restricting untrusted components from Europe’s subsea data cables strengthens governments’ national security and benefits European…
Precisely targeted cyber operations can remove blocking rules or disable network-blocking equipment. Cyberspace and the…
Vibe coding produces software riddled with insecurities. Will risk management and regulatory compliance, too, fall…
Criminals can use artificial intelligence, specifically large language models, to autonomously carry out ransomware attacks…
Cyber contingency campaigning, involving sustained cyber activity in peacetime, could be strategically impactful in a…
By taking Taiwan, China could erase America’s best hope of keeping its AI edge. For…
A review of Tamar Mitts, “Safe Havens for Hate: The Challenge of Moderating Online Extremism”…
Scientists find that people mostly avoid social media ads when they see them, but many…