The Digital Disruption
Increased connectivity allows for the spread of liberal, open values but also poses a number of dangers.
See more in United States, Cybersecurity
Increased connectivity allows for the spread of liberal, open values but also poses a number of dangers.
See more in United States, Cybersecurity
A favorite view of the Internet holds that the democratization of communications will bring about the democratization of the world.
See more in United States, Cybersecurity, Technology and Foreign Policy
Intel CEO Otellini expresses optimism for economic growth contingent upon the adoption of specific U.S. regulatory policies.
This session was part of the Corporate Program's CEO Speaker series.
See more in Cybersecurity, Technology and Foreign Policy, Telecommunications
Deputy Secretary of Defense William Lynn discusses the various new strategies used by the Pentagon to identify information technology threats, combat cyber warfare, and protect U.S. infrastructure.
See more in Cybersecurity, Intelligence, National Security and Defense
Deputy Secretary of Defense William Lynn discusses the various new strategies used by the Pentagon to identify information technology threats, combat cyber warfare, and protect U.S. infrastructure.
See more in Defense Technology, Cybersecurity, National Security and Defense
See more in Defense Technology, Cybersecurity
The Pentagon recognizes the catastrophic threat posed by cyberwarfare, and is partnering with allied governments and private companies to prepare itself.
See more in United States, Cybersecurity
Cybersecurity expert Knake recommends the United States use international forums to promote mechanisms that address security concerns in cyberspace while ensuring the Internet remains open for the free exchange of ideas across national boundaries.
See more in United States, Cybersecurity, Terrorism and Technology
See more in Cybersecurity
Robert K. Knake testifies before the House of Representatives Committee on Science and Technology on the role of attack attribution in preventing cyber attacks and how attribution technologies can affect the anonymity and the privacy of Internet users.
See more in United States, Cybersecurity
See more in United States, Cybersecurity
Google's decision to end censorship of its search content in China, and Beijing's response, appear to strike a balance between holding to principles and doing business, but U.S.-China clouds continue to gather, writes CFR's Adam Segal.
See more in China, Cybersecurity, Business and Foreign Policy
See more in United States, Cybersecurity
How well prepared are IT professionals within U.S. government agencies to respond to foreign cyber threats? Will government initiatives, such as the Comprehensive National Cybersecurity Initiative and the creation of the U.S. National Cybersecurity Coordinator role, be effective in addressing the challenges facing U.S. critical IT infrastructure? What is the impact of compliance on security within the federal IT environment?
See more in United States, Cybersecurity
The impact of the standoff between Google and China, argue Adam Segal and Robert K. Knake, may have less to do with censorship and more to do with the nature of technological development.
See more in United States, China, Cybersecurity, Health, Science, and Technology
The recently released Annual Threat Assessment warned of cyberattacks and attacks by al-Qaeda, but that doesn't mean al-Qaeda is capable of cyberterrorism, says CFR's Robert K. Knake.
See more in United States, Cybersecurity, Terrorism and Technology
See more in United States, Cybersecurity, Intelligence
Adam Segal argues that while, "China's cyberaggression doesn't mean that the United States should stop all attempts at engagement," the goal of an open and transparent Web may not be realistic.
See more in China, Cybersecurity
As part of the New York Times' "Cyberwar" series examining the growing use of computer power as a weapon, David E. Sanger et al. discuss the U.S. government's failing efforts cyber security.
See more in United States, Cybersecurity
See more in United States, Cybersecurity, Democracy and Human Rights
What effect would the fall of the Assad regime have on U.S. policy towards Syria?
Reforming U.S. Drone Strike Policies
The author analyzes the potentially serious consequences, both at home and abroad, of a lightly overseen drone program and makes recommendations for improving its governance.
The Battle of Bretton Woods
The remarkable story of how the blueprint for the postwar economic order was drawn. More
Invisible Armies
A complete global history of guerrilla uprisings through the ages. More
Tested by Zion
The full insider account of the Bush administration and the Israeli-Palestinian conflict. More