Cybersecurity
CSIS’s cybersecurity portfolio covers cyber warfare, encryption, military cyber capacity, hacking, financial terrorism, and more to provide the latest recommendations for the digital age.
Photo: Cambodian Government/Handout/Anadolu via Getty Images
From Fraud to the Frontlines: Scam Centers Caught in the Cambodia-Thailand Conflict
Critical Questions by Julia Dickson and Japhet Quitzon — January 15, 2026
Civil Takedowns: The Missing Legal Framework for Cyber Disruption
Commentary by Sezaneh Seymour — January 12, 2026
Protecting Subsea Cables: Detect to Deter, Sue to Secure
Commentary by Joel Coito — December 12, 2025
Taking on Cyber Scams: Ideas for Congress
Commentary by Julia Dickson and Emma Gargiulo — December 4, 2025
Past Events
Next Steps for the U.S.-Japan Alliance: Deterrence, Cybersecurity, and Indo-Pacific Partnerships
Photo: CSIS
Cyber Leaders Series: How Can Ukraine Win the Cyber War? A Conversation with Dr. Greg Rattray
Photo: CSIS
Launch: Commission on U.S. Cyber Force Generation
Photo: iLab/CSIS
Space and Data Domain Lessons from Russia-Ukraine | Conflict in Focus
Photo: CSIS
The Last Four Years of Cyber Policy: A Retrospective
Photo: SERGEI GAPON/AFP via Getty Images
Super Election Year: Recapping the Moldovan Elections
Photo: CSIS
Counterintelligence 2.0: A Fireside Conversation with NCSC Director Michael Casey
Photo: DANIEL SLIM/AFP/Getty Images
A Discussion on the UN Cybercrime Convention
Experts
All Cybersecurity Content
Filter by
From Fraud to the Frontlines: Scam Centers Caught in the Cambodia-Thailand Conflict
Critical Questions by Julia Dickson and Japhet Quitzon — January 15, 2026
Beyond Hacktivism: Iran's Coordinated Cyber Threat Landscape
Blog Post by Jiwon Lim — January 14, 2026
Next Steps for the U.S.-Japan Alliance: Deterrence, Cybersecurity, and Indo-Pacific Partnerships
Event — January 12, 2026
Civil Takedowns: The Missing Legal Framework for Cyber Disruption
Commentary by Sezaneh Seymour — January 12, 2026
Protecting Subsea Cables: Detect to Deter, Sue to Secure
Commentary by Joel Coito — December 12, 2025
Taking on Cyber Scams: Ideas for Congress
Commentary by Julia Dickson and Emma Gargiulo — December 4, 2025
Redundancy, Resiliency, and Repair: Securing Subsea Cable Infrastructure
Report by Erin L. Murphy — November 21, 2025
“Redundancy, Resiliency, and Repair: Securing Subsea Cable Infrastructure”: Audio Brief with Erin Murphy
Podcast Episode by Erin L. Murphy — November 21, 2025
The U.S. Army and a Second Manhattan Project for AI
Commentary by Jake S. Kwon and Benjamin Jensen — November 21, 2025
Force Design for the Twenty-First Century Fight: U.S. Cyber Force Lessons from China’s Strategic Support Forces
Commentary by Lauryn Williams — November 19, 2025