Featured commentary and analysis

All timely commentary & analysis

Feature

Aug 5, 2022

Operational technology: Cloudy, with a chance of data 

By Emma Schroeder

In the second episode of The Cyber Moonshot, we again follow Neymar, Zafira, and Ernest in a quaint little food court on the surface of the moon. Follow along in their journey to understand the operational technology-cloud convergence and track down the path of the malware that has infected their port – before it becomes a permanent winter wonderland!

The 5×5

Jun 29, 2022

The 5×5—Cybercrime and national security

By Simon Handler, Liv Rowley

Five experts weigh in on emerging trends in cybercrime and their impacts on national security. 

Cybersecurity Intelligence

The 5×5

May 12, 2022

The 5×5—Reflections on trusting trust: Securing software supply chains

By Simon Handler

Five experts discuss the implications of insecure software supply chains and realistic paths to securing them. 

Cybersecurity Defense Technologies

Article

May 9, 2022

Cyber strategy: Assumptions and hypotheticals 

By Yumi Gambrill and Emma Schroeder

When academics, policymakers, and practitioners discuss security and conflict within the cyber domain, they are often hampered by a series of ongoing debates and unarticulated assumptions. We have brought together members of these communities to discuss the reasons that these debates are important to the shaping of cybersecurity and strategic plans.

Cybersecurity

The 5×5

Apr 29, 2022

The 5×5—Addressing the global market for offensive cyber capabilities

By Simon Handler

Five experts unpack the global market for offensive cyber capabilities and the implications associated with the proliferation of hacking tools.

Conflict Cybersecurity

The 5×5

Mar 21, 2022

The 5×5—Russia’s cyber statecraft

By Simon Handler

Five experts share their perspectives on what recent cyber developments related to Russia’s war in Ukraine indicate about Russian cyber behavior.

Belarus Conflict

The 5×5

Feb 28, 2022

The 5×5—What’s in a cyber strategy?

By Simon Handler

What’s in a cyber strategy, how should one be created, how can observers gauge its effectiveness, and how might such a strategy be reflected in real-world conflicts?

Conflict Cybersecurity

Testimony

Feb 8, 2022

Herr testifies to Homeland Security and Governmental Affairs committee on responding to and learning from the Log4shell vulnerability

On February 8, 2022, Trey Herr, Director of the Cyber Statecraft Initiative within the Scowcroft Center for Strategy and Security, testified to the Senate Homeland Security and Governmental Affairs committee on responding to and learning from the Log4shell vulnerability.

Cybersecurity

The 5×5

Dec 21, 2021

The 5×5—Hindsight 2021: Cybersecurity is hard

By Simon Handler

We brought together a group of distinguished experts to unpack the year that was and provide an outlook on the cyber policy challenges that lie ahead.

Conflict Cybersecurity

The 5×5

Dec 9, 2021

The 5×5—The state of cybersecurity in Latin America

By Simon Handler

Experts provide insights into the current state of cybersecurity in Latin America, how capacity and cooperation could be improved, and what the future holds for the region.

Caribbean Conflict

The Atlantic Council’s Cyber Statecraft Initiative, under the Digital Forensic Research Lab (DFRLab), works at the nexus of geopolitics and cybersecurity to craft strategies to help shape the conduct of statecraft and to better inform and secure users of technology.