455 Items

A reflection of a man typing on a laptop computer

Matthew Roth/Wikimedia Commons

Analysis & Opinions - Lawfare

Backdoor in XZ Utils That Almost Happened

| Apr. 09, 2024

The xz Utils backdoor incident reveals that the security of the global internet depends on countless obscure pieces of software written and maintained by even more obscure unpaid, distractible, and sometimes vulnerable volunteers. It’s an untenable situation, and one that is being exploited by malicious actors. Yet precious little is being done to remedy it.

bus that runs on green hydrogen, framed by leaves

AP Photo/Anupam Nath

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

India - The New Global Green Hydrogen Powerhouse?

| Mar. 26, 2024

India aims to become a leading producer of green hydrogen by the next decade as part of its broader industrial and decarbonization strategies. This brief provides an overview of India's current hydrogen strategy, as well as the challenges - land and water scarcity, infrastructure gaps, and financing gaps - that must be addressed in order for India to achieve its ambitious goals.

Rohit Chopra and Pete Buttigieg

AP Photo/Andrew Harnik, File

Analysis & Opinions - cyberscoop

CFPB’s Proposed Data Rules Would Improve Security, Privacy and Competition

| Jan. 24, 2024

The collection and sale of consumer data is too lucrative for companies to say no to participating in the data broker economy. New rules proposed by the Consumer Financial Protection Bureau may help eliminate the incentive for companies to buy and sell consumer data.

Russian Foreign Minister Sergey Lavrov, center right, and Iranian Foreign Minister Hossein Amirabollahian, left, attend a joint news conference

Yury Kochetkov/Pool Photo via AP

Policy Brief - European Council on Foreign Relations

Alone Together: How the War in Ukraine Shapes the Russian-Iranian Relationship

| Sep. 06, 2023

This policy brief explains how Russia and Iran have sought to upgrade their partnership through greater diplomatic support for pushing back on Western hegemony, mutual provision of key weapons systems, and sharing of expertise on evading sanctions.

Neural net completion for "artificial intelligence"

Wikimedia Commons

Analysis & Opinions - Georgetown Journal of International Affairs

GPTs, Software Engineering, and a New Age of Hacking

| Aug. 16, 2023

ChatGPT and other natural language models have recently sparked considerable intrigue and unease. Governments and businesses are increasingly acknowledging the role of Generative Pre-trained Transformers (GPTs) in shaping the cybersecurity landscape. This article discusses the implications of using GPTs in software development and the potential impact on cybersecurity in the age of artificial intelligence (AI). While GPTs can improve efficiency and productivity for programmers, they will not replace human programmers due to the complex decision-making processes involved in programming beyond simply writing code. And while they may help in finding shallow bugs to prevent short-lived vulnerabilities, GPTs are unlikely to change the balance of power between offense and defense in cybersecurity.