Join us for a conversation featuring George Perkovich and Nicole Perlroth as the two discuss Perlroth’s recently published book, This is How They Tell Me the World Ends, and the urgent threat to us all if we cannot bring the cyber arms race to heel.
The Digital Services Act will require social media platforms to share data with researchers. But to understand influence operations, the EU must facilitate longer-term research collaboration between industry and academia.
With U.S. President Joe Biden in office, the EU and the United States must find ways to repair the relationship and seek common ground from which to address the global shifts and challenges of the coming decades.
When Joe Biden takes office as U.S. president, the EU will have four years to fireproof and rebuild relations with America. The EU must make an energetic investment in saving its most important relationship.
Cybersecurity experts are still assessing the Solar Winds hack and recent penetrations into government and corporate information systems around the world.
To get the transatlantic relationship back and on track and to ensure that it will remain relevant in the future, the United States and the European Union should prioritize putting forward concrete ideas and taking actionable steps on climate and energy, democracy and human rights, and digital technology issues.
To achieve broad and enduring benefits, disparate groups working to combat influence operations need to build a more unified, professional field.
Technology experts discuss how to understand and tackle problems in the current information environment.
This month, the Carnegie Endowment, in collaboration with the World Economic Forum, released a first-of-its-kind blueprint to better protect the global financial system against cyber threats. Join us for a discussion with leading voices in the Asia-Pacific on this report's crucial recommendations.
Cybersecurity is a unique challenge for the financial sector. To prevent massive financial losses, banks and other financial institutions should understand how cyber threat groups could launch complex new cyber attacks.