Experts discuss cybersecurity around the world.
Experts discuss cybersecurity around the world.
Experts assess the state of U.S. cybersecurity.
Experts discuss the laws and norms surrounding cyber issues.
CFR's David Fidler explores the value of deterrence in cybersecurity.
Policymakers around the world are increasingly concerned about the security of information and communications technology (ICT) supply chains. Danielle Kriz explains how the U.S. government can defend its ICT supply chains against counterfeit products, malicious code, and cyberattacks.
This bill would require websites and technology firms to share user information with the government if the government wants the information to response to a cyber threat. Critics of the bill say it is similar to Cyber Intelligence Sharing and Protection Act (CISPA), which did not pass the Senate two years ago.
Two new adjunct senior fellows, Esther Brimmer and Gordon Goldstein, have joined the Council on Foreign Relations' (CFR) growing roster of experts in international affairs and economics.
With over 40 percent of the world's population now online, the Internet has revolutionized the way the world communicates. But with fast evolving technology, a proliferation of actors with access to the Internet, and an absence of international consensus on what should be permissible, the gap between existing world arrangements and the challenges posed by the Internet is in fact widening.
With the U.S. government still dealing with the fallout from the cyber theft of over twenty million personnel records in 2014—one of the largest data breaches in history—a new book from Council on Foreign Relations Senior Fellow Micah Zenko reveals how red teams might have helped avoid such a disaster.
In this October 2015 article, Knake addresses the so-called “going dark” problem and whether the government should be able to lawfully exploit zero-day vulnerabilities.
Experts discuss possible policy approaches toward cyberattacks.
CFR's David Fidler examines the impact that malware and other cybersecurity threats have had on markets and international trade.
As offensive cyber activity becomes more prevalent, policymakers will be challenged to develop proportionate responses to disruptive or destructive attacks. Tobias Feakin outlines the variables that each state should consider in determining the appropriate response to a state-sponsored cyber incident.
Hackers are often mistakenly portrayed in popular culture as inarticulate geeks donning hoodies or ninja suits. However, the opposite is true, and policymakers in Washington could benefit from a deeper understanding of who hackers are and what they have to offer.
In this August 2015 article, Knake discusses how corporations should approach developing an effective cyber risk strategy, and how to prepare for a breach.
Jerome A. Cohen and Zachary Goldman consider the challenge of Sino-US cooperation on cybersecurity.
The growth of renewable energy and distributed generation is placing the aging U.S. energy grid under increasing pressure at a time when concerns over its reliability are on the rise.
National People's Congress of China released this draft text on July 6, 2015, and it will be available for public comment through August 2015. The law outlines the Chinese government's goals for security standards for technical systems, networks, and user data. It requires companies with operations in China to comply with government requests for regulating and restricting technology use. See also the broader National Security Law passed on July 1, 2015.
The use of social media and other Internet-enabled communications by the self-proclaimed Islamic State is pushing the United States and other democracies to react to the abuse of liberal freedoms by illiberal forces. CFR Visiting Fellow David P. Fidler outlines ways to counter the Islamic State's online onslaught through policies anchored in free speech, transparency, and accountability.
What CFR.org Editors are reading the week of June 1–5, 2015.
This report argues that the lack of sustained attention to energy issues is undercutting U.S. foreign policy and national security.
To ensure the success of Myanmar's historic democratic transition, the United States should revise its outdated and counterproductive sanctions policy.
Blackwill and Campbell analyze the rise of Chinese President Xi Jinping and call for a new American grand strategy for Asia.
Williams argues that greater U.S. involvement is necessary to enhance the quality and success of peacekeeping missions.
Kurlantzick offers the sharpest analysis yet of what state capitalism’s emergence means for democratic politics around the world. More
In a cogent analysis of why the United States is losing ground as a world power, Blackwill and Harris explore the statecraft of geoeconomics. More
Takeyh and Simon reframe the legacy of U.S. involvement in the Arab world from 1945 to 1991 and shed new light on the makings of the contemporary Middle East. More
Learn more about CFR’s mission and its work over the past year in the 2015 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass.
Read and download »