February 18, 2016Privacy
Protecting the privacy of user data from unauthorized access is essential for business executives, policymakers, and users themselves. The pace of targeted attacks and massive data breaches is only i…
October 19, 2018Donald Trump
The Empty Throne: America’s Abdication of Global Leadership, my latest book with Ivo H. Daalder, just debuted. It chronicles President Trump’s first eighteen months directing U.S. foreign policy. We …
September 6, 2018Cybersecurity
It is easy to draw analogies between early nuclear scholarship and its cyber counterpart. However, three factors make scholarly research about cyber conflict a significantly more challenging task.
June 2, 2017Israeli-Palestinian Conflict
On the war’s fiftieth anniversary, five scholars discuss how Israel, the Palestinian territories, and the Arab world were remade.
December 12, 2018Women and Economic Growth
Kristalina Georgieva, Chief Executive Officer of the World Bank, discusses legal and regulatory disparities in access to and usage of formal financial institutions and highlight how well designed dig…
October 25, 2017North Korea
North Korea's activities in cyberspace have drawn a lot of attention but there is little evidence that they are strategically significant.