Cybersecurity
Led by the Strategic Technologies Program and the International Security Program, CSIS’s cybersecurity portfolio covers cyber warfare, encryption, military cyber capacity, hacking, financial terrorism, and more.
Space Threat Assessment 2024
The 2024 Space Threat Assessment covers the growing counterspace capabilities of China, Russia, India, Iran, North Korea, and others. It also features analysis on the normalization of deviance on orbit and a look into coalitions of convenience that are being formed.
Report by Clayton Swope, Kari A. Bingen, Makena Young, Madeleine Chang, Stephanie Songer, and Jeremy Tammelleo — April 17, 2024
Eroding Trust in Government: What Games, Surveys, and Scenarios Reveal about Alternative Cyber Futures
Report by Yasir Atalan, Benjamin Jensen, and Jose M. Macias III — April 8, 2024
TikTok and National Security
Commentary by James Andrew Lewis — March 13, 2024
Government Use of Deepfakes
Report by Daniel Byman, Daniel W. Linna Jr., and V. S. Subrahmanian — March 12, 2024
Past Events
Counterspace Trends: An Evolving Global Landscape
Shaping the Future of Federal Cybersecurity: Insights from FCEBs
5G/6G Technology and the Future of Global Security
A Discussion of the 2023 Counter Ransomware Initiative with DNSA Anne Neuberger
CISA's Evolving .gov Mission: Report Rollout Event
Managing Geopolitical Risk in Mexico's ICT Sector
China's Strategy of Political Warfare: Views from Congress
Next War Online: Using Cyber Games to Understand Emerging Threats
Experts
All Cybersecurity Content
Filter by
Filtering By:
The Effect of Encryption on Lawful Access to Communications and Data
Report by James Andrew Lewis, Denise E. Zheng, and William A. Carter — February 8, 2017
Web Book: The Military Balance in the Koreas and Northeast Asia
Report by Anthony H. Cordesman — January 31, 2017
Workshop Report: ISCN-CSIS Washington Workshop 2016 Nuclear Security Collaboration Between CoEs and Civil Society: Filling the Gaps
Report by Sharon Squassoni — September 2, 2016
Russia and the DNC Hacks
Commentary by James Andrew Lewis — August 15, 2016
What to Make of the Newly Established CyberSecurity Association of China
Commentary by Samm Sacks and Robert O’Brien — May 25, 2016
Indictments, Countermeasures, and Deterrence
Commentary by James Andrew Lewis — March 25, 2016
Encryption Myths and Fables
Commentary by James Andrew Lewis — March 11, 2016
Managing Risk for the Internet of Things
Report by James Andrew Lewis — February 17, 2016
Posturing and Politics for Encryption
Commentary by James Andrew Lewis — February 17, 2016
North Korea’s Cyber Operations
Report by James Andrew Lewis, Victor Cha, Jenny Jun, Scott LaFoy, and Ethan Sohn — December 30, 2015