AI & Emerging Technology

Cyber

× Clear Filters
443 Articles
Visualization of quantum technology

The Security Stakes in the Global Quantum Race

By acting early, states can build governance frameworks that support the responsible development and adoption of quantum technologies.
Visualization of cybersecurity

What It Takes to Stop the Next Salt Typhoon

A roadmap for the Trump administration to address cyber vulnerabilities that persist nearly a year after the Salt Typhoon intrusion.
A collage of images featuring scenes from the Russia - Ukraine War.

Just Security’s Russia–Ukraine War Archive

A catalog of over 100 articles (many with Ukrainian translations) on the Russia Ukraine War -- law, diplomacy, policy options, and more.
The US Department of Homeland Security building

Incoming DHS Intelligence Lead Promotes Unlawful Activities

The public, Congress, and the media should insist that the DHS's domestic intelligence practices be sunset, rather than expanded.

Call Them What They Are: Time to Fix Cyber Threat Actor Naming

The Microsoft-CrowdStrike partnership on cyber threat actor naming conventions is welcome, but more comprehensive reform is needed to serve defenders and the public.
The Just Security Podcast logo

The Just Security Podcast: A Conversation with Jen Easterly — Cybersecurity at a Crossroads

How do leaders steer through cyber crises and chart a path forward? Jen Easterly unpacks challenges, breakthroughs, and lessons from the front lines of U.S. cybersecurity.
The U.S. Capitol is seen after the House narrowly passed a bill forwarding President Donald Trump's agenda at the U.S. Capitol on May 22, 2025 in Washington, DC. (Photo by Kevin Dietsch/Getty Images)

AI Governance Needs Federalism, Not a Federally Imposed Moratorium

Congress should reject the proposed “AI preemption moratorium.” It is bad policy and is likely unconstitutional under the Tenth Amendment.

Fireside Chat with Singapore’s Chief of Cybersecurity David Koh: Navigating the New Global Tech Order

Remarks from Singapore's Chief of Cybersecurity David Koh for the Just Security-Oxford Global Tech Policy Seminar Series.
Sen. Patrick Leahy sits in front of a poster with examples of Russian-created Facebook pages

Is the U.S. Abandoning the Fight Against Foreign Information Operations?

The Trump administration's policy shift paves the way for foreign propaganda to flourish, leaving Europe to step into the breach.
A group of Ukrainian women demonstrate against war rape, holding posters.

Ukraine’s Use of Technology in Sexual and Gender-Based Crimes Investigations

Technology can help bring justice for Ukrainian survivors of sexual and gender-based crimes, but the process is not without challenges.
Conceptual image of a laptop surrounded by cloud illustrations and being watched by security cameras

One Step Forward? Agreement on Spyware Regulation in the Pall Mall Process

A new code marks a serious commitment by states to regulate digital surveillance tools, but stops short of agreeing to hard legal standards.
Bitcoin cryptocurrency on the U.S. flag

How Congress Can Stop the Looming Crypto Disaster

Legislative and administrative accommodation of the crypto industry pose fundamental challenges to control over money and credit.
1-12 of 443 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: