Skip to:

Cybersecurity

Scholarly Publications

Cyber negotiation: a cyber risk management approach to defend urban critical infrastructure from cyberattacks

March 2019

Abstract: Technical tools dominate the cyber risk management market. Social cybersecurity tools are severely underutilised in helping organisations defend themselves against cyberattacks.

The Strategic Promise of Offensive Cyber Operations

September 2018

Abstract: Could offensive cyber operations provide strategic value? If so, how and under what conditions?

Integrating offensive cyber capabilities: meaning, dilemmas, and assessment

August 2018

Across the world, states are establishing military cyber commands or similar units to develop offensive cyber capabilities.

Other Publications

Artificial Intelligence and Counterterrorism: Possibilities and Limitations

June 2019

Prepared Written Testimony and Statement for the Record of Alexander Stamos, Director, Stanford Internet Observatory before The U.S.

Democracy’s Dilemma

June 2019

This document is a memo from the "Global Populisms and their International Diffusion Conference" held at Stanford University on March 1-2, 2019.This is a work in progress.

News

Decades of Being Wrong About China Should Teach Us Something

June 2019

Thirty years ago this week, I watched the news from Beijing and started shredding my bedding.

MIP Feature Friday: Maho Sugihara

May 2019

"Being at Stanford is a unique experience...

Understanding 'Putin's Playbook'

April 2019

To thwart the effects of ‘Putinism,’ the American people must first understand the nature of the threat, Michael McFaul told the House Intelligence Committee.What is “Putinism,” and what threat...

Events

The Cyber Security Threat: Lessons Learned from Devastating Attacks in Ukraine and the US

March 14, 2019

Recent years have witnessed an increasing number of cyber attacks originating in Russia that target the United States, European Union and EU member-states.

Bytes, Bombs, and Spies The Strategic Dimensions of Offensive Cyber Operations

December 14, 2018

Offensive cyber operations have become increasingly important elements of U.S. national security policy.

The Perfect Weapon: War, Sabotage and Fear in the Modern Age

October 22, 2018

Click here to RSVPAbstract: The Perfect Weapon is the startling inside story of how the rise of cyberweapons in all their forms—from attacks on electric grids to attacks on electoral systems—has...

Projects

Critical Infrastructure Resilience

The Critical Infrastructure Initiative builds the cyber-resilience of critical infrastructure through methodologically diverse outputs-oriented research and engagement with end users and homeland...
English

Multimedia

Cybersecurity Strategies

May 2018

In a world of increasingly sophisticated hackers, continual phishing attacks, and bots created to sabotage civil public discourse, what can individuals, organizations, and nations do to protect themselves? In this video, Dr.

Cybersecurity

May 2018

Data breaches. Malware. Theft of corporate secrets. Hacking of elections. As the world’s information has moved more and more online, so have the world’s crime, terrorists, and clandestine operations.

How will Michael Flynn's resignation affect US-Russia relations?

February 2017

Russia expert and Stanford University senior fellow Kathryn Stoner on Russian reaction to the national security adviser's resignation. Watch the video here.

People

Alex Stamos Adjunct Professor Visiting Scholar, Hoover Institution, Director, Stanford Internet Observatory
Herb Lin Herbert Lin Senior Research Scholar
Andrew Grotto Andrew Grotto Research Scholar, Lecturer
Headshot of Thomas Fingar Thomas Fingar Lecturer at APARC
Harold Trinkunas Harold Trinkunas Deputy Director, Senior Research Scholar
Amy Zegart Senior Fellow Senior Fellow, Hoover Institution, Professor, by courtesy, Political Science
Eileen Donahoe Lecturer, CDDRL
Nathaniel Persily Co-director, Cyber Policy Center, Senior Fellow Professor, Law, Professor, by courtesy, Political Science, Professor, by courtesy, Communication
Dan Boneh Dan Boneh Co-director, Cyber Policy Center Professor, Electrical Engineering
Jan Rydzak Research Scholar, CDDRL Research Scholar and Associate Director for Program, GDPi
Gregory Falco Postdoctoral Fellow
Max Smeets Max Smeets Postdoctoral Fellow