Content

New Atlanticist

Aug 7, 2020

Trump’s TikTok ban is bad policy

By Justin Sherman

There are real security questions to ask about Chinese government influence over technology companies; but the idea of broadly banning TikTok is a bad one that steps in the wrong direction on protecting a free and open internet.

China Cybersecurity

In-Depth Research & Reports

Aug 4, 2020

Alliance power for cybersecurity

By Kenneth Geers

There is only one internet, and cybersecurity is therefore an inherently international challenge that countries cannot tackle alone. Alliances like NATO and the EU give democratic countries a cyber edge over their authoritarian challengers.

Cybersecurity Europe & Eurasia

Event Recap

Jul 31, 2020

Event recap | The future of trust and sensemaking

By Hannah Biggs

On July 30, 2020, the GeoTech Center hosted a discussion on ways to best increase trust and sensemaking in our communities as we further integrate our digital and physical lives.

Cybersecurity Digital Policy

In the News

Jul 29, 2020

Jun interviewed on NK News about North Korea’s cyber activity

Cybersecurity Korea

New Atlanticist

Jul 29, 2020

The 5×5—Fighting COVID-19 with surveillance: Perspectives from across the globe

By Simon Handler and Lily Liu

As more countries rely on digital tools to contain the spread of COVID-19, how will enhanced surveillance challenge privacy norms in the future? According to the World Health Organization, public health surveillance is critical to containing the pandemic. However, can enhanced surveillance during a public health crisis set precedents for digital surveillance in the future?

Africa Coronavirus

Blog Post

Jul 27, 2020

#DFRLabCoffeeBreak with DFRLab Nonresident Fellow Cindy Otis

The DFRLab Coffee Break is a video series meant to discuss how disinformation and digital change affect industries, policy making, and society with a community of experts, academics, and leaders from around the world. Our guest in this video is DFRLab Nonresident Fellow Cindy Otis. In the interview, Cindy breaks down how society can tackle […]

Cybersecurity Digital Policy

Trackers and Data Visualizations

Jul 26, 2020

Software supply chain security: The dataset

By Will Loomis, Stewart Scott, Trey Herr, Sara Ann Brackett, Nancy Messieh, and June Lee

Want to dive deeper into the Breaking Trust database? You have come to the right place.

Cybersecurity Technology & Innovation

Feature

Jul 26, 2020

App stores in focus

By Trey Herr, June Lee, Will Loomis, and Stewart Scott

App stores and hubs are a popular target for software supply chain attacks on large numbers of users, exploiting trust in proprietary app ecosystems and the security of storefronts like Play Store and App Store.

Cybersecurity Technology & Innovation

Feature

Jul 26, 2020

Deep impact: States and software supply chain attacks

By Trey Herr, June Lee, Will Loomis, and Stewart Scott

States have used software supply chain attacks to great effect. Hijacked updates have routinely delivered the most crippling state-backed attacks, thanks in part to a continued failure to secure the code-signing process.

China Cybersecurity

Report

Jul 26, 2020

Breaking trust: Shades of crisis across an insecure software supply chain

By Dr. Trey Herr, William Loomis, Stewart Scott, June Lee

Software supply chain security remains an under-appreciated domain of national security policymaking. Working to improve the security of software supporting private sector enterprise as well as sensitive Defense and Intelligence organizations requires more coherent policy response together industry and open source communities.

Cybersecurity Defense Technologies

Experts

Events