Cybersecurity

Defense

Filter By:

Type

Fellow

Research Team

Use comma-separated ID numbers for each author

Support the Hoover Institution

Join the Hoover Institution's community of supporters in advancing ideas defining a free society.

Support Hoover

Cyber and Information Technology

Articles On: Democratic Technology Policy, Cybersecurity, Counterfeit, Mobile Web Browsers, and the Internet

via China Global Sharp Power Weekly Alert
Sunday, November 1, 2020

The Chinese Communist Party seeks to control information technology as a means to shape and censor the communications and opinions of its own people, as well as the communications of individuals beyond China's borders.

Blank Section (Placeholder)

Battlegrounds w/ H.R. McMaster: The Japan- US Alliance and the Vision for a Free & Open Indo-Pacific

via Hoover Podcasts
Wednesday, October 28, 2020

AUDIO ONLY

Battlegrounds w/ H.R. McMaster: The Japan- US Alliance and the Vision for a Free & Open Indo-Pacific.
Blank Section (Placeholder)

Democracy, Good Governance And Pluralism | 2020 Conference on Taiwan in the Indo-Pacific Region | Panel 5

via Hoover Podcasts
Monday, October 26, 2020

AUDIO ONLY

Democracy, Good Governance And Pluralism | 2020 Conference on Taiwan in the Indo-Pacific Region | Panel 5
Interviews

“The Perfect Weapon” Screening And Discussion With David Sanger And Amy Zegart

interview with Amy Zegartvia Georgetown University Center for Security Studies
Monday, October 26, 2020

Hoover Institution fellow Amy Zegart talks about the new HBO documentary The Perfect Weapon.

Blank Section (Placeholder)

PRC Influence And Interference | 2020 Conference on Taiwan in the Indo-Pacific Region | Panel 4

via Hoover Podcasts
Thursday, October 22, 2020

AUDIO ONLY

PRC Influence And Interference | 2020 Conference on Taiwan in the Indo-Pacific Region | Panel 4

Cyber and Information Technology

Articles On: The Cloud, 5G Pact, and Huawei

via China Global Sharp Power Weekly Alert
Saturday, September 7, 2019

The Chinese Communist Party seeks to control information technology as a means to shape and censor the communications and opinions of its own people, as well as the communications of individuals beyond China's borders.

Cyber and Information Technology

Articles On: Cyberattacks, Hackers, 5G, Telecoms Ban, and Supply Chain

via China Global Sharp Power Weekly Alert
Sunday, October 25, 2020

The Chinese Communist Party seeks to control information technology as a means to shape and censor the communications and opinions of its own people, as well as the communications of individuals beyond China's borders.

Blank Section (Placeholder)Analysis and Commentary

Due Diligence And The U.S. Defend Forward Cyber Strategy

by Eric Talbot Jensen, Sean Wattsvia Lawfare
Tuesday, October 20, 2020

As its name implies, the 2018 US Department of Defense Defend Forward strategy is principally reactive. The strategy assumes that the United States will continue to suffer harm from competitors and malign actors through cyberspace. Accordingly, it outlines US reactions in order to preempt threats, defeat ongoing harm, and deter future harm. 

Cyber and Information Technology

Articles On: WeChat, Hackers, RedDelta, Data Grab, and Digital Surveillance

via China Global Sharp Power Weekly Alert
Sunday, September 27, 2020

The Chinese Communist Party seeks to control information technology as a means to shape and censor the communications and opinions of its own people, as well as the communications of individuals beyond China's borders.

Blank Section (Placeholder)

Sharp Power, Natural Resources And Sustainable Development | 2020 Conference | Panel 2

via Hoover Podcasts
Tuesday, October 20, 2020

Sharp Power, Natural Resources And Sustainable Development.

Pages

Watch the LiveStream!