Google's decision to end censorship of its search content in China, and Beijing's response, appear to strike a balance between holding to principles and doing business, but U.S.-China clouds continue to gather, writes CFR's Adam Segal.
This initiative is the product of several reviews of cybersecurity strategies from multiple government departments, especially the Cyberspace Policy Review.
How well prepared are IT professionals within U.S. government agencies to respond to foreign cyber threats? Will government initiatives, such as the Comprehensive National Cybersecurity Initiative and the creation of the U.S. National Cybersecurity Coordinator role, be effective in addressing the challenges facing U.S. critical IT infrastructure? What is the impact of compliance on security within the federal IT environment?
The recently released Annual Threat Assessment warned of cyberattacks and attacks by al-Qaeda, but that doesn't mean al-Qaeda is capable of cyberterrorism, says CFR's Robert K. Knake.
Dennis Blair, Director of National Intelligence, gave this testimony on the assessment of threats to national security to the Senate Select Committee on Intelligence on February 2, 2010.
As part of the New York Times' "Cyberwar" series examining the growing use of computer power as a weapon, David E. Sanger et al. discuss the U.S. government's failing efforts cyber security.
Reports of Predator drones' data losses in Iraq and Afghanistan should serve as a call to action to upgrade U.S. cybersecurity capabilities, says analyst James Lewis.
Wired's Noah Schachtman reports for the Danger Room on the susceptibility of U.S. Air Force ROVER video systems to hacking.
This report was prepared by the Northrop Grumman Corporation for the U.S. government's U.S.-China Economic and Security Review Commission.
Robert K. Knake argues that the Department of Homeland Security will fall short of its goal to hire 1,000 cybersecurity experts over the next three years.
Listen to Massimo Sarmi, chief executive officer of Poste Italiane, discuss the steps that his organization is taking to address cybersecurity threats.
Watch Massimo Sarmi, chief executive officer of Poste Italiane, discuss the steps that his organization is taking to address cybersecurity threats.
Listen to Janet Napolitano, U.S. secretary of homeland security, address the threat of networked terrorist organizations and the Department of Homeland Security's strategy to prevent and respond.
Janet Napolitano, U.S. secretary of homeland security, delivers an address at CFR.
Watch Janet Napolitano, U.S. secretary of homeland security, address the threat of networked terrorist organizations and the Department of Homeland Security's strategy to prevent and respond to them.
President Obama gave these remarks on May 29, 2009, on the day the 60-Day Cyber Space Policy Review was released.
This report argues that the lack of sustained attention to energy issues is undercutting U.S. foreign policy and national security.
The author examines Pakistan's complex role in U.S. foreign policy and advocates for a two-pronged approach that works to quarantine threats while integrating Pakistan into the broader U.S. agenda in Asia.
The authors assess the political, security, and economic challenges facing U.S. policymakers in Afghanistan and evaluate a range of policy options.
Special operations play a critical role in how the United States confronts irregular threats, but to have long-term strategic impact, the author argues, numerous shortfalls must be addressed.
This clear and authoritative book presents a sweeping account of China's global resource quest and the unrivaled expansion of its economy. More
The story of the tragic and often tormented relationship between the United States and Pakistan, and a call to prepare for the worst, aim for the best, and avoid past mistakes. More
An authoritative and accessible look at what countries must do to build durable and prosperous democracies—and what the United States and others can do to help. More