A discussion of ICT supply chain integrity and complementary measures by governments and ICT suppliers on how to reduce systemic risks, restore confidence in the integrity of ICTs, and forestall fragmentation of the marketplace.
The U.S.-China “trade war” may give way to a “tech war” as regulators and firms battle over emerging technologies, standards, and whether America or China will dominate future industries. Outside Washington, the relationship between Chinese and American business is complex and changing fast.
In reaction to recent campaigns to compromise democratic elections and to influence public opinion, Western governments have taken steps to create more resilient democracies in the digital world.
The Carnegie Endowment for International Peace is pleased to host an international conference focused on government vulnerability management.
Two new U.S. cyber strategies—a holistic national strategy for cyberspace and another guiding the efforts of U.S. military—have reinforced a critical need for the U.S. Departments of Defense and Homeland Security to work together in cyberspace.
Cybercrime seems invisible. Attacks arrive out of nowhere, their origins hidden by layers of sophisticated technology. Only the victims are clear. But every crime has its perpetrator—specific individuals or groups sitting somewhere behind keyboards and screens.
Cyberspace has become center stage for international competition and confrontation.
Hackers targeting financial institutions have exposed the vulnerability of the global financial system, highlighting the need for businesses and the government to better protect against these cyber threats.
The U.S. government and private sector are still not sufficiently agile to keep up with cyber threats.
As cyberspace has emerged as a new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power.