Cyber Security News
Jun 18, 2015
In a follow up to his previous book (“Terror on the Internet”), Gabriel Weimann's newest work describes a growing and untamed cyberspace environment that is providing a natural and effective base of operations for the next generation of online terrorist. Are efforts to thwart those online efforts keeping pace with the level of threat? That’s the focus of this edition of Wilson Center NOW.
May 12, 2015
The number of non-indexed internet sites is estimated to be 500 times larger than what a search engine can reveal. Wilson Center Public Policy Fellow Daniel Sui is attempting to uncover the dark side of the Internet that is a conduit for all types of illegal and often dangerous activity.
May 04, 2015
On this edition of REWIND Estonia's President, Toomas Hendrik Ilves, joins us for a discussion on the state of Estonia’s cybersecurity, privacy, and the digital economy.
Mar 19, 2015
Cyber threats, and related vulnerabilities, are becoming more numerous and sophisticated. And the job of keeping one step ahead of the problem is a most daunting task. During a recent Director's Forum, Lisa Monaco, Assistant to the President for Homeland Security and Counterterrorism, delivered a keynote speech about the evolving threats and the Obama Administration's comprehensive strategy to address them. She also discussed the topic with Wilson Center Director, Jane Harman and fielded question from participants in the public forum. That’s the focus of this edition of REWIND.
Mar 12, 2015
"No agency employee should be able to say 'cyber' isn't in their job description," writes Jane Harman.
Feb 25, 2015
Secretary of Homeland Security, Jeh Johnson, recently delivered a major address at the Wilson Center. Afterwards, he discussed the latest efforts to secure America from a myriad of threats ranging from terrorism to natural disasters with the Center’s director and president, Jane Harman. That’s the focus of this edition of REWIND.
Jan 13, 2015
"It's easy to miss blips on the digital radar when there are so many, but if our miscalculation about the kinetic capabilities of ISIS is any measure, we ought to pay attention to the CENTCOM hack," writes Meg King.
Sep 26, 2014
In order to effectively navigate the online environment in a manner that builds trust while also addressing security needs, government and non-government actors must address the questions and concerns of a generation raised in a digital world. The most tech savvy among us, as both citizens and practitioners, will have a lot to say about the future of digital surveillance and the laws that will regulate such activity. That’s the focus of this edition of REWIND.
Aug 29, 2014
While governments are responsible for intelligence gathering in pursuit of national security, much of the technology and tools they rely on are created and owned by private companies. Consequently, there are significant opportunities for cooperation and conflict. That’s the focus of this edition of REWIND.
Aug 15, 2014
Do friends spy on friends? It’s a simple question requiring a complex answer. The question represents one of the most contentious aspects of the new global security environment. And while keeping an eye on allies as well as enemies is nothing new, agreement on where to draw lines on such activity remains elusive.