Shaming Chinese Hackers Won't Work Because Cyber Espionage is Here to Stay

Author: Adam Segal
The Guardian

In preparation for President Xi Jinping and President Barack Obama's meeting in California on June 7-9, Adam Segal writes, "The presidents won't come to any agreements next week, but over the course of the two days, they should try and dispel the growing mistrust by explaining their national interests and intentions in cyberspace."

See more in United States; Cybersecurity; China

Other Report

Protecting Data Privacy With User-Friendly Software

Author: Sara "Scout" Sinclair Brody

Protecting the privacy of user data from unauthorized access is essential for business executives, policymakers, and users themselves. But strong privacy protection software is often difficult for nonexperts to use. In this Cyber Brief, Sara "Scout" Sinclair Brody explains how promoting and improving open-source software can go a long way toward strengthening privacy online.

See more in Global; Cybersecurity; Privacy

Other Report

Developing a Proportionate Response to a Cyber Incident

Author: Tobias Feakin

As offensive cyber activity becomes more prevalent, policymakers will be challenged to develop proportionate responses to disruptive or destructive attacks. Tobias Feakin outlines the variables that each state should consider in determining the appropriate response to a state-sponsored cyber incident.

See more in Global; Cybersecurity