Homogeneity and concentration in the browser
Web browsers are the gateway to the internet. As browser developers replicate design features and concentrate around shared underlying technologies, they create cybersecurity risks with the potential…
Competition is a cybersecurity issue, but @Jshermcyber.bsky.social says policymakers must “acknowledge how questions of market concentration may not address other questions around the security and resilience of underlying foundational technologies”
06.08.2025 19:04 — 👍 0 🔁 1 💬 0 📌 0
What the Israel-Iran conflict revealed about wartime cyber operations
The cyber operations on display during the recent twelve-day conflict appear to have offered an incremental edge in warfare, rather than a revolutionary one.
What can we learn about the cyber dimension of the Israel-Iran war?
It can be easy to conflate volume of cyber activity with decisive impact, says Nikita Shah, but in truth, it was largely a shaping, augmenting, and enabling function.
🔗
05.08.2025 14:29 — 👍 0 🔁 0 💬 0 📌 0
Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace
If the United States wishes to compete in cyberspace, it must compete against China to secure its offensive cyber supply chain.
China is building offensive cyber capability from the ground up—through student competitions, regional research labs, and private researchers aiding state operations. For the US, says DeSombre Bernsen, supporting homegrown talent is a strategic imperative.
🔗 www.atlanticcouncil.org/in-depth-res...
01.08.2025 13:50 — 👍 0 🔁 0 💬 0 📌 0
Form
Thinking about applying to the Congressional Cyber & Digital Policy Program? Join our happy hour with alumni & CSI staff on Thursday, Aug. 7 at Barrel D.C. to learn more!
🍸 Register here:
31.07.2025 19:17 — 👍 0 🔁 0 💬 0 📌 0
What the Israel-Iran conflict revealed about wartime cyber operations
The cyber operations on display during the recent twelve-day conflict appear to have offered an incremental edge in warfare, rather than a revolutionary one.
In a new publication, CSI senior fellow Nikita Shah discusses four types of cyber activity seen in the ongoing Israel-Iran war—and what it says about the role of cyber in contemporary conflict.
Read the piece here:
31.07.2025 16:12 — 👍 0 🔁 0 💬 1 📌 0
O$$ security: Does more money for open source software mean better security? A proof of concept
A proof-of-concept study looking for correlation between open source software project funding and security practices at scale.
Sneak Peek: In both the Python and npm ecosystems, funding is correlated with improved scores for both the ⚠️Dangerous Workflows⚠️ and 🗝️Token Permissions🗝️ subchecks, as well as others! Want to know more? Read the full report here report ⬇️ www.atlanticcouncil.org/content-seri...
31.07.2025 13:17 — 👍 0 🔁 0 💬 0 📌 0
CSI's recent O$$ report investigates whether open source software projects with general funding have better security practices on average than similar unfunded projects with Open SSF Scorecards. We dove into the subchecks to figure out which ones increased with funding 📈💰🔐
31.07.2025 13:17 — 👍 0 🔁 0 💬 1 📌 0
Four recommendations:
1️⃣ Use existing infrastructure as a data-sharing and analytics hub.
2️⃣ Invest in long-term efforts to improve technical security.
3️⃣ Build a stockpile of critical FPGAs
4️⃣ Launch cross-sector planning efforts f to accelerate recovery.
30.07.2025 19:19 — 👍 0 🔁 0 💬 1 📌 0
To secure reprogrammable chips, the US must address supply chain risks
This policy brief analyzes the FPGA supply chain for US firms and the trade-offs these companies make among risks to cost, availability, and security.
Following the release of the American AI Action Plan, a new report from Andrew Kidd, Celine Lee, and Bruce Schneier explores the importance of the field-programmable gate array (FPGA) supply chain to US national security.
🔗 Read the full report: www.atlanticcouncil.org/in-depth-res...
30.07.2025 19:19 — 👍 0 🔁 0 💬 1 📌 0
a spider-man is flying through the air in a city
ALT: a spider-man is flying through the air in a city
🗽The cyber world needs heroes — and no, not just the ones in capes.
The New York City #Cyber912 returns virtually on October 10-11, 2025, in partnership with @ColumbiaSIPA. Assemble your team and register now form.jotform.com/251977349018...
30.07.2025 15:02 — 👍 1 🔁 1 💬 0 📌 0
Did you know @BlackHatEvents has gifted passes to their conferences in Asia, the US, and Europe for winning teams of the 2024-25 #Cyber912 competition season?
Through this gift, students from around the world will access timely infosec debates and networking opportunities.
29.07.2025 19:54 — 👍 0 🔁 0 💬 0 📌 0
Next week our #Cyber912 competition winners from New York, Austin, and DC will be heading to the Mandalay Bay Convention Center for Black Hat USA 2025! Comment below if we’ll see you there! www.blackhat.com/us-25/
29.07.2025 19:54 — 👍 0 🔁 0 💬 1 📌 0
Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace
If the United States wishes to compete in cyberspace, it must compete against China to secure its offensive cyber supply chain.
The US risks losing its edge in offensive cybersecurity—not due to lack of talent, but lack of support. In her report, Winnona DeSombre Bernsen highlights a gap: US investment currently leaves offensive researchers stuck in a “training valley of death.”
www.atlanticcouncil.org/in-depth-res...
28.07.2025 13:37 — 👍 0 🔁 0 💬 0 📌 0
The 5×5—Strengthening the cyber workforce
Experts provide insights into ways for the United States and its allies to bolster the cyber workforce.
What is one assumption holding back the cyber workforce? Richard Harris thinks “one problematic assumption is that the market, academia, or government alone can solve the problem of cyber workforce shortages.”
Read the full 5x5 on the cyber workforce here:
www.atlanticcouncil.org/content-seri...
25.07.2025 20:03 — 👍 0 🔁 0 💬 0 📌 0
The 5x5—The XZ backdoor: Trust and open source software
Open source software security experts share their insights into the XZ backdoor, and what it means for open source software security.
What role can investments play in supporting open source software? We asked Tobie Langel, Aeva Black, Christopher Robinson, Stewart Scott, and Fiona Karkenburger just that in this edition of 5x5 series.
www.atlanticcouncil.org/content-seri...
24.07.2025 15:17 — 👍 0 🔁 0 💬 0 📌 0
Tackling the Spyware Crisis
Domestic investment in spyware is undermining national security at all levels of society.
US venture capital is fueling the spyware industry. Companies backed by American dollars have enabled surveillance on US officials and allies. More about how the Trump administration can combat this issue in:
23.07.2025 20:04 — 👍 1 🔁 0 💬 0 📌 0
Four myths about the cloud: The geopolitics of cloud computing
In competition and cooperation, cloud computing is the canvas on which states conduct significant political, security, and economic activity.
Cloud myth #2: Cloud computing is not a supply chain risk.
Fact: Cloud computing, like telecommunications and other software, has its own complex hardware and software supply chains, which face (and create) their own risks.
Learn more here: www.atlanticcouncil.org/in-depth-res...
23.07.2025 14:43 — 👍 0 🔁 0 💬 0 📌 0
Congressional Cyber and Digital Policy Program
Open to full time Congressional staffers, this program covers key cybersecurity and digital policy issues.
🚨 Applications are OPEN for our Fall 2025 Congressional Cyber and Digital Policy Program! 🚨 For full-time Congressional staffers ready to build knowledge on cyber and digital issues. Fridays, Sept 26 – Oct 31. 🔗 Learn more here:
22.07.2025 19:48 — 👍 0 🔁 0 💬 0 📌 0
What do we know about cyber operations during militarized crises?
Policymakers must critically examine assumptions and claims that cyber operations can serve as de-escalatory crisis offramps.
When used during times of military crisis, are cyber operations truly de-escalatory crisis offramps, or have they the potential to exacerbate an already accelerated decision making process?
Michael Fischerkeller looks at the implications in this piece:
21.07.2025 19:03 — 👍 0 🔁 0 💬 0 📌 0
“Cyber is becoming a business imperative.”
At the launch of the National #CyberWorkforce and Education Strategy, Rob Duhart spoke on how the private sector can support workforce development.
Watch the full event here: www.atlanticcouncil.org/event/unleas...
21.07.2025 13:38 — 👍 0 🔁 0 💬 0 📌 0
Cyber, privacy, tech policy, geopolitics @ Global Cyber Strategies, EPIC, Georgetown Law, Atlantic Council, Lawfare. Views my own. He/him
Book out Dec. 2025: “Navigating Technology and National Security”
https://globalcyberstrategies.com
Create and share social media content anywhere, consistently.
Built with 💙 by a global, remote team.
⬇️ Learn more about Buffer & Bluesky
https://buffer.com/bluesky
American University's School of International Service prepares students to wage peace and build understanding in our world.
Official account of American University Washington College of Law. We #ChampionWhatMatters in all areas of the law.
Director of Public Interest Cybersecurity @CLTCBerkeley. Views my own.
Deputy Director @DistrictCon
Helping society anticipate and address tomorrow's information security challenges, in order to amplify and extend the upside of the digital revolution.
✒️ Senior researcher - GEODE/French Institute of Geopolitics
International Law, Tech Regulation, Cyberwarfare, Proliferation, IHL, Digital Rights.
Strauss Center for International Security & Law
@UTAustin
Official BlueSky Account
#StraussCAMPI #StraussBrumley #StraussCyber #StraussSpace #StraussTech #StraussNSL