Skip to:

Cybersecurity

Scholarly Publications

The Strategic Promise of Offensive Cyber Operations

September 2018

Abstract: Could offensive cyber operations provide strategic value? If so, how and under what conditions?

Integrating offensive cyber capabilities: meaning, dilemmas, and assessment

August 2018

Across the world, states are establishing military cyber commands or similar units to develop offensive cyber capabilities.

Integrating Offensive Cyber Capabilities: Meaning, dilemmas, and assessment

August 2018

Abstract: Across the world, states are establishing military cyber commands or similar units to develop offensive cyber capabilities.

Other Publications

Andrew Grotto Testimony on "Cybersecurity and California Elections"

March 2018

To assess the threat to California's elections systems, the Assembly and Senate elections committees held a joint informational hearing on cybersecurity. The hearing discussed steps California...

News

America’s misbegotten cyber strategy

February 2019

I used to think we didn’t have enough strategic documents guiding U.S. cyber policy. Now I think we have at least one too many.

Scholars examine cyber warfare in new book

January 2019

War is changing, and the U.S.

Active cyber defense and interpreting the computer fraud and abuse act

December 2018

 In the cybersecurity field, the term “active defense” is often used in a variety of ways, referring to any activity undertaken outside the legitimate span of control of an organization being...

Events

Bytes, Bombs, and Spies The Strategic Dimensions of Offensive Cyber Operations

December 14, 2018

Offensive cyber operations have become increasingly important elements of U.S. national security policy.

The Perfect Weapon: War, Sabotage and Fear in the Modern Age

October 22, 2018

Click here to RSVPAbstract: The Perfect Weapon is the startling inside story of how the rise of cyberweapons in all their forms—from attacks on electric grids to attacks on electoral systems—has...

The Consequences of Technological Developments for Politics and Government

April 17, 2018

The Consequences of Technological Developments for Politics and GovernmentTuesday, April 24, 2018Reception at 5:00pm.

Projects

Critical Infrastructure Resilience

The Critical Infrastructure Initiative builds the cyber-resilience of critical infrastructure through methodologically diverse outputs-oriented research and engagement with end users and homeland...
English

Multimedia

Cybersecurity Strategies

May 2018

In a world of increasingly sophisticated hackers, continual phishing attacks, and bots created to sabotage civil public discourse, what can individuals, organizations, and nations do to protect themselves? In this video, Dr.

Cybersecurity

May 2018

Data breaches. Malware. Theft of corporate secrets. Hacking of elections. As the world’s information has moved more and more online, so have the world’s crime, terrorists, and clandestine operations.

How will Michael Flynn's resignation affect US-Russia relations?

February 2017

Russia expert and Stanford University senior fellow Kathryn Stoner on Russian reaction to the national security adviser's resignation. Watch the video here.

People

Alex Stamos Adjunct Professor William J. Perry Fellow
Herb Lin Herbert Lin Senior Research Scholar
Harold Trinkunas Harold Trinkunas Deputy Director, Senior Research Scholar
Andrew Grotto Andrew Grotto Research Scholar, Lecturer
Thomas Fingar Shorenstein APARC Fellow
Amy Zegart Senior Fellow Senior Fellow, Hoover Institution, Professor, by courtesy, Political Science
Eileen Donahoe Adjunct Professor, CDDRL
Nathaniel Persily Professor, Stanford Law School
Dan Boneh Dan Boneh Co-director of the Stanford Cyber Initiative
Jan Rydzak Research Scholar Research Scholar and Associate Director for Program, GDPi
Gregory Falco Postdoctoral Fellow
Max Smeets Max Smeets Postdoctoral Fellow