February 18, 2016Privacy
Protecting the privacy of user data from unauthorized access is essential for business executives, policymakers, and users themselves. The pace of targeted attacks and massive data breaches is only i…
September 6, 2018Cybersecurity
It is easy to draw analogies between early nuclear scholarship and its cyber counterpart. However, three factors make scholarly research about cyber conflict a significantly more challenging task.
October 25, 2017North Korea
North Korea's activities in cyberspace have drawn a lot of attention but there is little evidence that they are strategically significant.
June 2, 2017Israeli-Palestinian Conflict
On the war’s fiftieth anniversary, five scholars discuss how Israel, the Palestinian territories, and the Arab world were remade.