Cyber Security

Creating Safe Cyberspace: Strategies for Deterring Cyberattacks

Thousands, perhaps even millions, of successful cyberattacks occur each year across governmental and commercial sectors in the U.S., and attempts...

Up in the Cloud: Data and Security Concerns in Cloud Computing

Cloud computing enables convenient access to a networks, servers, storage, applications, and services. In a cloud computing framework, shared resources...

Opportunities and Challenges Associated with the Internet of Things

Although the Internet of Things has major potential for economic opportunities, it still faces problems in data privacy, security, and other areas that have yet to be overcome.

Secret No More: A Closer Look at the US Government’s Role in Addressing Cybersecurity Threats

As cellular surveillance devices become democratized and globalized, the US government should reconsider its strategy of shielding information about surveillance technology used by law enforcement—a practice which can compromise consumer security protection.

Hacking Back against Cyber Attacks

Active defense against cyber crimes falls into a grey area between what is legal and what is not. Without a sound regulatory framework for cyber security practices, back hacking actions are both challenging and risky.

No Opposition Party is an Island: Taiwan’s Defense and Domestic Politics

Newly elected DPP Secretary-General and opposition party member Dr. Joseph Wu discusses upcoming elections, mainland China, and Taipei’s defense posture as part of the wider US-Asia/Pacific rebalancing effort.

Policy Radio | Cyber Security In the 21st Century

In this week's episode of Chicago Policy Radio, Thomas Day sits down with David Benson to discuss cyber terrorism, its implications for international security, and the often exaggerated perception of this risk.