Cybersecurity requires technically literate analyses of policy, its impact, and alternative approaches. The Cybersecurity, Strategy, and Policy program works to inform policymaking that will improve the security of technology systems and their users, covering topics from improved cybersecurity metrics and policy design to building more defensible cloud computing services and software supply chains.

Featured Content

Artificial Intelligence

Open Source Software

Publications

Feature

Jul 26, 2020

App stores in focus

By Trey Herr, June Lee, Will Loomis, and Stewart Scott

App stores and hubs are a popular target for software supply chain attacks on large numbers of users, exploiting trust in proprietary app ecosystems and the security of storefronts like Play Store and App Store.

Cybersecurity Technology & Innovation

Feature

Jul 26, 2020

Deep impact: States and software supply chain attacks

By Trey Herr, June Lee, Will Loomis, and Stewart Scott

States have used software supply chain attacks to great effect. Hijacked updates have routinely delivered the most crippling state-backed attacks, thanks in part to a continued failure to secure the code-signing process.

China Cybersecurity

Report

Jun 15, 2020

The reverse cascade: Enforcing security on the global IoT supply chain

By Nathaniel Kim, Trey Herr, and Bruce Schneier

The Internet of Things (IoT) refers to the increasing convergence of the physical and digital worlds and it affects us all. Hundreds of “things” are being connected to the Internet and each other, with more than fifty billion devices expected to be connected by 2030. Many IoT devices are manufactured abroad at low cost with little consideration for security. How can we secure these devices, especially those manufactured outside the United States?

Cybersecurity Internet of Things

New Atlanticist

May 19, 2020

Seven perspectives on securing the global IoT supply chain

By Trey Herr

Many IoT devices are manufactured abroad and many of these are extremely low cost with little consideration made for security. There is nothing inherently untrustworthy or insecure about foreign manufacturing, and individual firm and product lines are much more fruitful levels of analysis in establishing good security practices from bad. Importantly however—the United States has limited means to enforce its standards in foreign jurisdictions, like China, where the bulk of IoT products are manufactured.

Cybersecurity Internet

New Atlanticist

Jan 27, 2020

Warring for the soul of the internet: Ten years on

By Trey Herr, Justin Sherman

The new reality is one where democracies must play a more assertive role to protect an open, free, fair, and secure internet, utilizing a strategy that recognizes the changes the internet has undergone, the pernicious influence of authoritarian states, and the role companies have in both protecting and fragmenting it. The internet can’t be brought back in time but there is hope, perhaps, that its original core values can be preserved in a new form through determined effort by its users, some companies, and the democratic states where the open web was born.

Cybersecurity Internet

New Atlanticist

Nov 16, 2018

Securing the consumer internet of things

By Beau Woods and Jack Watson

Unfortunately, the norm for IoT devices is lax security—simple, hardcoded (unchangeable) passwords, and operating systems that can’t be patched or updated with security protection. Thus, on October 14, 2018, the United Kingdom’s department for Digital, Culture, Media, and Sport (DCMS) published its “Code of Practice for Consumer IoT Security.”

Cybersecurity Security & Defense

Issue Brief

Sep 11, 2018

Defining Russian election interference: An analysis of select 2014 to 2018 cyber enabled incidents

By Laura Galante & Shaun Ee

Of all the political ideas to defend themselves before the court of human history, few have proven as potent and as compelling as that of electoral democracy. Yet in recent years, electoral democracy has once more come under challenge, facing off against popular discontent, revisionist governments, and—most significantly—the rise of new media and digital technologies. […]

Cybersecurity Elections

Issue Brief

May 30, 2018

Supply chain in the software era

By Beau Woods and Andy Bochman

As the energy sector has become more globalized and increasingly complex in its reliance on software components, the supply-chain risk has evolved and expanded. One such risk that stands out is unintended taint, namely flaws in software components unintentionally built into products in design or implementation.

Cybersecurity English

The Atlantic Council’s Cyber Statecraft Initiative, part of the Atlantic Council Technology Programs, works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.