Foreign Policy Blogs

Technology

Cyber Espionage: Reducing Tensions Between China and the United States

Cyber Espionage: Reducing Tensions Between China and the United States

read more

Cybersecurity: Top Challenges and Six Big Policy Action Ideas

Cybersecurity: Top Challenges and Six Big Policy Action Ideas

read more

Cybersecurity and U.S. Foreign Policy: Five Questions with Professor Ronald Deibert

Cybersecurity and U.S. Foreign Policy: Five Questions with Professor Ronald Deibert

read more

Has the United States Opened Itself to Cyber Attack?

Has the United States Opened Itself to Cyber Attack?

read more

There’s “Flame,” But Where’s the Smoke?

There’s “Flame,” But Where’s the Smoke?

read more

If You Can't Beat 'Em, Beat 'Em

If You Can't Beat 'Em, Beat 'Em

read more

Freedom versus Regulation 2.0

Freedom versus Regulation 2.0

read more

Auntie Steve vs. the Malbots

Auntie Steve vs. the Malbots

read more

Organizing for cybersecurity – how fast is fast enough?

Organizing for cybersecurity – how fast is fast enough?

read more

Keeping Neutral

Keeping Neutral

read more

WikiLeaks: the New Napster

WikiLeaks: the New Napster

read more

Shoehorning Cyber Warfare Capabilities into the Existing System

Shoehorning Cyber Warfare Capabilities into the Existing System

read more

The Worm Will Not Turn On North Korea

The Worm Will Not Turn On North Korea

read more

Cyber Isn't Just for Geeks

Saying “I’m writing my master’s thesis on cybersecurity” is akin to saying “I’m writing my thesis about the United States.” It is often quoted that the internet was developed more for interoperability than to address security concerns. The silver lining? Russia is still expanding its tech industry. The field is still growing and evolving. New technological developments, such as the adoption of iPv6 have yet to take hold. This means that there is still room (to a certain extent) to get in at the ground level.

read more

The Firesheep Are Coming! Quick, to the SSL Tunnels!

The Firesheep Are Coming! Quick, to the SSL Tunnels!

read more