Content

Trackers and Data Visualizations

Jul 26, 2020

Software supply chain security: The dataset

By Will Loomis, Stewart Scott, Trey Herr, Sara Ann Brackett, Nancy Messieh, and June Lee

Want to dive deeper into the Breaking Trust database? You have come to the right place.

Cybersecurity
Technology & Innovation

Feature

Jul 26, 2020

App stores in focus

By Trey Herr, June Lee, Will Loomis, and Stewart Scott

App stores and hubs are a popular target for software supply chain attacks on large numbers of users, exploiting trust in proprietary app ecosystems and the security of storefronts like Play Store and App Store.

Cybersecurity
Technology & Innovation

Feature

Jul 26, 2020

Deep impact: States and software supply chain attacks

By Trey Herr, June Lee, Will Loomis, and Stewart Scott

States have used software supply chain attacks to great effect. Hijacked updates have routinely delivered the most crippling state-backed attacks, thanks in part to a continued failure to secure the code-signing process.

China
Cybersecurity

Report

Jul 26, 2020

Breaking trust: Shades of crisis across an insecure software supply chain

By Dr. Trey Herr, William Loomis, Stewart Scott, June Lee

Software supply chain security remains an under-appreciated domain of national security policymaking. Working to improve the security of software supporting private sector enterprise as well as sensitive Defense and Intelligence organizations requires more coherent policy response together industry and open source communities.

Cybersecurity
Defense Technologies

In the News

Jul 24, 2020

The geopolitics of digital identity: Dr. David Bray and Lord Tim Clement Jones

By Atlantic Council

Lord Tim Clement Jones, Geotech fellow, and Dr. David Bray, director of the Geotech Center, discussed the issue of digital identity in a recent event at the IdentityNorth Summit. Lord Jones pointed out how technologies for securely connecting an individual’s digital presence to their identity are not new, but have yet to be applied at a national scale, or in a universal manner that would be necessary to maximize their impact. He recognized, though, that certain applications of digital identity technology might be of concern to ordinary people; though he might be comfortable using his digital identity as part of the United Kingdom Parliament’s new system for MPs to vote, the average citizen might take concern with their votes being tabulated digitally, or being connected to other facets of their online identity.

Cybersecurity
Digital Policy

Conflict, Risk, and Tech

Jul 22, 2020

Troubled vision: Understanding recent Israeli–Iranian offensive cyber exchanges

By JD Work and Richard Harknett

Reported Iranian intrusions against Israeli critical infrastructure networks and alleged Israeli actions against Iranian proliferation-associated targets pose substantial new challenges to understanding ongoing competition and conflict in the Middle East.

Cybersecurity
Iran

In the News

Jul 20, 2020

Sherman interviewed on Cornell Law School’s “A Law in Common” podcast on the US-India tech relationship

Cybersecurity
Defense Technologies

New Atlanticist

Jul 20, 2020

Nine cyberattacks that will remind you of your ex

By Safa Shahwan Edwards

Just as you should be wary of reconnecting with someone who should probably be left in the past, keep an eye out for an increase in cyber incidents. In preparation for the very real possibility of exes coming out of the woodwork and cyber incidents making the news, we’ve identified nine cyberattacks that will remind you of your ex.

Cybersecurity

In the News

Jul 17, 2020

Sherman quoted in WIRED about the Trump administration’s discussed ban on TikTok

Cybersecurity
Internet

In the News

Jul 16, 2020

Sherman quoted in Mic.com about the Trump administration’s discussed ban on TikTok

Cybersecurity
Internet

Experts

Events