Cybersecurity
Led by the Strategic Technologies Program and the International Security Program, CSIS’s cybersecurity portfolio covers cyber warfare, encryption, military cyber capacity, hacking, financial terrorism, and more.
Why a Critical Infrastructure Designation for Cloud Won’t Enhance Security—And What Would
With the increasing reliance on cloud computing and greater concerns about its security, CSIS adjunct fellow Yinuo Geng explains why cloud security needs more than just adding it to the list of critical infrastructures.
Commentary by Yinuo Geng — July 17, 2023
The National Security Benefits of Reallocating Federal Spectrum for 5G
Report by Clete Johnson — July 14, 2023
Cyber Operations during the Russo-Ukrainian War
Brief by Grace B. Mueller , Benjamin Jensen , Brandon Valeriano , Ryan C. Maness , and Jose M. Macias — July 13, 2023
Threats Happen; Consequences Don’t Have to
Commentary by Emily Harding and Suzanne Spaulding — July 11, 2023
Past Events
The DOJ Criminal Division's Cyber Initiatives
Competing for the Future of Cloud Computing
Creating a Consumer-Centric Digital Finance Ecosystem
The Biden Administration’s Cyber Plans for Critical Infrastructure: Focus on Pipelines, Rails, Aviation
Report Launch: Evolving Cyber Operations and Capabilities
Does the U.S. Need a Cyber Force?
A Conversation on Cybersecurity with NSA’s Rob Joyce
We Hold These Truths: How Verified Content Defends Democracies
Experts
All Cybersecurity Content
Filter by
National Security and Spectrum for 5G
Event by Jessica Rosenworcel , Clete Johnson , and James A. Lewis — July 25, 2023
The DOJ Criminal Division's Cyber Initiatives
Event by Kenneth A. Polite, Jr. and Nicole M. Argentieri — July 20, 2023
Why a Critical Infrastructure Designation for Cloud Won’t Enhance Security—And What Would
Commentary by Yinuo Geng — July 17, 2023
The National Security Benefits of Reallocating Federal Spectrum for 5G
Report by Clete Johnson — July 14, 2023
An Insiders’ Look at Recent Experiences Freeing Up Spectrum for 5G
Podcast Episode by Clete Johnson — July 13, 2023
Cyber Operations during the Russo-Ukrainian War
Brief by Grace B. Mueller , Benjamin Jensen , Brandon Valeriano , Ryan C. Maness , and Jose M. Macias — July 13, 2023
Competing for the Future of Cloud Computing
Event by Bill Whyman , Antonio García Zaballos , Stephan Lang , and Jonathan McHale — July 12, 2023
Threats Happen; Consequences Don’t Have to
Commentary by Emily Harding and Suzanne Spaulding — July 11, 2023
Creating a Consumer-Centric Digital Finance Ecosystem
Event by Romina Bandura , Michael Schlein , Christopher Burns , Sophie Sirtaine , John Simon , and Rosita Najmi — June 27, 2023
Indian Science: Awakening the Sleeping Giant
Commentary by Jayant Krishna — June 22, 2023