Cyber Security

Ukraine’s 2019 Elections: Preparing for More Russian Cyberattacks

BY NIKOLAS KOZLOFF

Lies, Bots, and Social Media: Global Fellow Nina Jankowicz Testifies Before Helsinki Commission

At this Helsinki Commission briefing, Global Fellow Nina Jankowicz  and other distinguished experts will examine the implications of computational propaganda on national and international politics and explore options available to Congress and the private sector to confront and negate its pernicious influence.

WATCH NOW>>>>

The Real Challenges of Artificial Intelligence: Automating Cyber Attacks

Most cyber attacks today do not occur instantaneously with the push of a button. They are resource and time-intensive endeavors (especially the reconnaissance phase), that are orchestrated by humans and unfold at human speeds; the time and resources needed by the adversary are directly proportional to the quality and level of defenses employed on the network.

The Changing Mobility Ecosystem: Our Autonomous Future

By Jeremy Spaulding, Emma Grossman, Aidan Reilly Giunta

Corresponding Author: Jeremy Spaulding

Manipulating Fast, and Slow

As a discipline, cyberpsychology focuses on the impact of emerging technologies on human behavior. In this article, Dr. Mary Aiken talks about how the discipline helps us better understand online manipulation of audiences -- particularly in the context of recent elections. Most critically, cyberpsychology as a discipline may offer the tools to examine critical questions in security to fake news and we must fully explore this potential. Read more by downloading the brief below.

Security and the Connected Vehicle

Today's vehicles have effectively become computers on wheels: from navigation systems to infotainment to HMI (human-machine interface). To date, these technologies have helped to improve the overall experience of driving in many ways. But are security protocols being properly considered in implementing such technologies? Are these systems built to last in today's high-threat cyber environments? What is the mobility sector doing to secure transportation today and tomorrow? How do smart cities and government regulations impact these connected vehicles?

Book Launch: The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

The Wilson Center presents an exclusive look at The Perfect Weapon, the sobering new book by acclaimed New York Times National Security Correspondent David Sanger, who researched and wrote while in residence as a distinguished fellow:

The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country.

Pages