917 Items

A reflection of a man typing on a laptop computer

Matthew Roth/Wikimedia Commons

Analysis & Opinions - Lawfare

Backdoor in XZ Utils That Almost Happened

| Apr. 09, 2024

The xz Utils backdoor incident reveals that the security of the global internet depends on countless obscure pieces of software written and maintained by even more obscure unpaid, distractible, and sometimes vulnerable volunteers. It’s an untenable situation, and one that is being exploited by malicious actors. Yet precious little is being done to remedy it.

bus that runs on green hydrogen, framed by leaves

AP Photo/Anupam Nath

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

India - The New Global Green Hydrogen Powerhouse?

| Mar. 26, 2024

India aims to become a leading producer of green hydrogen by the next decade as part of its broader industrial and decarbonization strategies. This brief provides an overview of India's current hydrogen strategy, as well as the challenges - land and water scarcity, infrastructure gaps, and financing gaps - that must be addressed in order for India to achieve its ambitious goals.

Rohit Chopra and Pete Buttigieg

AP Photo/Andrew Harnik, File

Analysis & Opinions - cyberscoop

CFPB’s Proposed Data Rules Would Improve Security, Privacy and Competition

| Jan. 24, 2024

The collection and sale of consumer data is too lucrative for companies to say no to participating in the data broker economy. New rules proposed by the Consumer Financial Protection Bureau may help eliminate the incentive for companies to buy and sell consumer data.

Dr. Henry Kissinger, foreground, at a White House strategy session. Pictured from the left are: Secretary of State William P. Rogers. U.S. President Richard Nixon, and Defense Secretary Melvin R. Laird.

AP/Bob Daugherty

Journal Article - H-Diplo | Robert Jervis International Security Studies Forum

Miller on Trachtenberg and Jervis on SALT

| Sep. 27, 2023

At a moment when arms control is deeply troubled and may be dying, two eminent scholars, Marc Trachtenberg and the late Robert Jervis, have taken a fresh look at the beginnings of strategic arms control fifty years after the signing in Moscow of the SALT I agreements in May of 1972. They do so from different vantage points, writes Steven E. Miller.

Neural net completion for "artificial intelligence"

Wikimedia Commons

Analysis & Opinions - Georgetown Journal of International Affairs

GPTs, Software Engineering, and a New Age of Hacking

| Aug. 16, 2023

ChatGPT and other natural language models have recently sparked considerable intrigue and unease. Governments and businesses are increasingly acknowledging the role of Generative Pre-trained Transformers (GPTs) in shaping the cybersecurity landscape. This article discusses the implications of using GPTs in software development and the potential impact on cybersecurity in the age of artificial intelligence (AI). While GPTs can improve efficiency and productivity for programmers, they will not replace human programmers due to the complex decision-making processes involved in programming beyond simply writing code. And while they may help in finding shallow bugs to prevent short-lived vulnerabilities, GPTs are unlikely to change the balance of power between offense and defense in cybersecurity.