Cyber Security News

Webcast

Beyond Google: The Dark Side of the Internet

May 12, 2015
The number of non-indexed internet sites is estimated to be 500 times larger than what a search engine can reveal. Wilson Center Public Policy Fellow Daniel Sui is attempting to uncover the dark side of the Internet that is a conduit for all types of illegal and often dangerous activity.
Webcast

The Estonia Model: A Conversation With President Toomas Hendrik Ilves on a Free and Secure Internet

May 04, 2015
On this edition of REWIND Estonia's President, Toomas Hendrik Ilves, joins us for a discussion on the state of Estonia’s cybersecurity, privacy, and the digital economy.
Webcast

Cyber Threats and Vulnerabilities

Mar 19, 2015
Cyber threats, and related vulnerabilities, are becoming more numerous and sophisticated. And the job of keeping one step ahead of the problem is a most daunting task. During a recent Director's Forum, Lisa Monaco, Assistant to the President for Homeland Security and Counterterrorism, delivered a keynote speech about the evolving threats and the Obama Administration's comprehensive strategy to address them. She also discussed the topic with Wilson Center Director, Jane Harman and fielded question from participants in the public forum. That’s the focus of this edition of REWIND.

How the CIA can get from spy to cyberspy

Mar 12, 2015
"No agency employee should be able to say 'cyber' isn't in their job description," writes Jane Harman.
Webcast

A Conversation with Secretary of Homeland Security Jeh Johnson

Feb 25, 2015
Secretary of Homeland Security, Jeh Johnson, recently delivered a major address at the Wilson Center. Afterwards, he discussed the latest efforts to secure America from a myriad of threats ranging from terrorism to natural disasters with the Center’s director and president, Jane Harman. That’s the focus of this edition of REWIND.

Why to Fear ISIS's Cyber Caliphate

Jan 13, 2015
"It's easy to miss blips on the digital radar when there are so many, but if our miscalculation about the kinetic capabilities of ISIS is any measure, we ought to pay attention to the CENTCOM hack," writes Meg King.
Webcast

Earning the Trust of “Digital Natives”

Sep 26, 2014
In order to effectively navigate the online environment in a manner that builds trust while also addressing security needs, government and non-government actors must address the questions and concerns of a generation raised in a digital world. The most tech savvy among us, as both citizens and practitioners, will have a lot to say about the future of digital surveillance and the laws that will regulate such activity. That’s the focus of this edition of REWIND.
Webcast

Government and Business: Cooperation or Conflict?

Aug 29, 2014
While governments are responsible for intelligence gathering in pursuit of national security, much of the technology and tools they rely on are created and owned by private companies. Consequently, there are significant opportunities for cooperation and conflict. That’s the focus of this edition of REWIND.
Webcast

Do Friends Spy on Friends?

Aug 15, 2014
Do friends spy on friends? It’s a simple question requiring a complex answer. The question represents one of the most contentious aspects of the new global security environment. And while keeping an eye on allies as well as enemies is nothing new, agreement on where to draw lines on such activity remains elusive.

In a Post 9-11, Post-Snowden World, How Have We Changed?

Jul 31, 2014
Since 9/11 Americans have had to reexamine their tolerance for intelligence gathering as it relates to national security, particularly in the wake of revelations by former NSA contractor Edward Snowden. The evolving relationship between security and liberty is explored by a panel of experts in this edition of REWIND.

Pages