Content

New Atlanticist

May 4, 2021

A plea to the Pentagon: Don’t sacrifice resilience on the altar of innovation

By JC Herz

US defense systems are vulnerable because they are brittle and unmaintained, and thus not resilient. Fixing it will require a new approach to acquisition.

Cybersecurity Defense Industry

Report

Mar 29, 2021

Broken trust: Lessons from Sunburst

By Trey Herr, Will Loomis, Emma Schroeder, Stewart Scott, Simon Handler, and Tianjiu Zuo

The story of trust is an old one, but the Sunburst cyber-espionage campaign was a startling reminder of the United States’ collective cyber insecurity and the inadequacy of current US strategy to compete in a dynamic intelligence contest in cyberspace.

Cybersecurity Intelligence

Article

Feb 4, 2021

Protecting the new frontier: Seven perspectives on aerospace cybersecurity

By Simon Handler

The aviation community is experiencing unprecedented difficulties, while space is emerging as a new fronter with challenges of its own. But there are opportunities for experts across the aerospace sector to tackle its cybersecurity challenges.

Cybersecurity Space

Issue Brief

Feb 1, 2021

Pathologies of obfuscation: Nobody understands cyber operations or wargaming

By Nina Kollars and Benjamin Schechter

National security and defense professionals have long utilized wargames to better understand hypothetical conflict scenarios. With conflict in the cyber domain becoming a more prominent piece in wargames in the national security community, this issue brief seeks to identify the common pathologies, or potential pitfalls, of cyber wargaming.

Cybersecurity National Security

New Atlanticist

Dec 21, 2020

To defend US elections, we must recognize that the fault is in ourselves

By Nina Kollars and Michael Rodriguez

It is time to put money toward state information infrastructure, to align public expectations with the pace of the democratic process, and to hold elected leaders accountable for lighting fires in information dumpsters.

Cybersecurity Disinformation

Report

Dec 14, 2020

How do you fix a flying computer? Seeking resilience in software-intensive mission systems

By Trey Herr, Reed Porada, Simon Handler, Orton Huang, Stewart Scott, Robert Lychev, and Jeremy Mineweaser

Defense organizations, by nature, confront unanticipated and highly impactful disruptions. They must adapt complex mission systems to withstand these disruptions and accomplish defined objectives. To ensure mission systems like the F-35 remain available, capable, and lethal in conflicts to come demands the United States and its allies prioritize the resilience of these systems.

Cybersecurity Defense Industry

Report

Oct 5, 2020

The politics of internet security: Private industry and the future of the web

By Justin Sherman

The private sector plays a crucial role in defining the changing shape of the Internet, especially its security. This report examines two protocols as examples of private sector influence over presently vulnerable systems key to the Internet’s function: the Border Gateway Protocol (BGP), used to route Internet traffic, and the Domain Name System (DNS), used to address Internet traffic.

Cybersecurity Internet

Report

Sep 28, 2020

Dude, where’s my cloud? A guide for wonks and users

By Simon Handler, Lily Liu, and Trey Herr

Cloud computing is transforming society, from interactions between people to the ways by which companies do business, and even how militaries operate. If you have ever been curious about what exactly “the cloud” meant; if you are a policy wonk not a technologist, a user not an admin, then this report is for you.

Cybersecurity Internet

Trackers and Data Visualizations

Jul 26, 2020

Software supply chain security: The dataset

By Will Loomis, Stewart Scott, Trey Herr, Sara Ann Brackett, Nancy Messieh, and June Lee

Want to dive deeper into the Breaking Trust database? You have come to the right place.

Cybersecurity Technology & Innovation

Report

Jul 26, 2020

Breaking trust: Shades of crisis across an insecure software supply chain

By Dr. Trey Herr, William Loomis, Stewart Scott, June Lee

Software supply chain security remains an under-appreciated domain of national security policymaking. Working to improve the security of software supporting private sector enterprise as well as sensitive Defense and Intelligence organizations requires more coherent policy response together industry and open source communities.

Cybersecurity Defense Technologies