Cybersecurity

Defense

Filter By:

Type

Fellow

Research Team

Use comma-separated ID numbers for each author

Support the Hoover Institution

Join the Hoover Institution's community of supporters in advancing ideas defining a free society.

Support Hoover

Jacquelyn Schneider and Herb Lin: Cyber Power and Peril in the Post-Covid World

interview with Jacquelyn Schneider, Herbert Linvia Hoover Virtual Policy Briefings
Tuesday, June 2, 2020

A Hoover Virtual Policy Briefing with Jacquelyn Schneider and Herb Lin: Cyber Power and Peril in the Post-Covid World
Tuesay, June 2, 2020 at 11AM PT/ 2PM ET.

The Classicist with Victor Davis Hanson:
Blank Section (Placeholder)Blank Section (Placeholder)PoliticsAnalysis and Commentary

The Classicist: Dark Days Ahead

interview with Victor Davis Hansonvia The Classicist
Saturday, May 30, 2020

On political polarization, the debt reckoning, and Chinese aggression.

In the News

Is It A Game Or Is It Real? Simulations And Wargaming In Cyber

quoting Jacquelyn Schneidervia Atlantic Council
Tuesday, May 26, 2020

In the summer of 2002, the United States Armed Forces conducted the Millennium Challenge (MC02), a three-week exercise simulating a military confrontation between “Blue” forces, the United States, and “Red” forces, a fictitious formidable Persian Gulf state. Consisting of computer simulations and live exercises, the joint, 13,000-person, $250 million wargame’s objective was to put the United States military’s “transformation”––a shift toward more network-centric operations––to the test. 

Policy Seminar with Jacquelyn Schneider

Thursday, April 23, 2020
Virtual Meeting

Jacquelyn Schneider, Hoover Fellow at the Hoover Institution, discussed “A No-First-Use Cyber Policy? The Solution to the U.S. Two Threshold Cyber Strategy Problem.”

Event
Blank Section (Placeholder)PoliticsAnalysis and Commentary

Robert Service Assesses Czar Vladimir

interview with Robert Servicevia Area 45
Friday, April 10, 2020

Putin’s grip on power and the role of oligarchs in maintaining that power.

Analysis and Commentary

The Cyberspace Solarium Commission: From Competing To Complementary Strategies

by Jacquelyn Schneidervia Lawfare
Wednesday, April 1, 2020

President Eisenhower’s 1953 Solarium Commission gathered top thinkers to weigh the merits of three logically distinct strategies to combat the Soviet Union; advocates of each position suggested distinct policies for U.S. arms development, doctrine and force posture. Today’s Cyberspace Solarium Commission drew from the story of Eisenhower’s 1953 commission and brought together practitioners, experts and scholars to tackle the challenge of cyberspace for U.S. strategy.

Blank Section (Placeholder)Blank Section (Placeholder)Analysis and Commentary

Pacific Century: Suing China?

interview with Michael R. Auslin, John Yoo, James Kraskavia The Pacific Century
Saturday, March 28, 2020

Can the US Hold China Responsible for the Pandemic?

Analysis and Commentary

‘Just Say No’ Is Not A Strategy For Supply Chain Security

by David Forscey, Herbert Linvia Lawfare
Wednesday, March 25, 2020

On Feb. 12, White House National Security Adviser Robert O’Brien announced that the U.S. government has “evidence that Huawei has the capability secretly to access sensitive and personal information in systems it maintains and sells around the world.” This represents the latest attempt by the Trump administration to support an argument that allied governments—and the businesses they oversee—should purge certain telecommunications networks of Huawei equipment. 

Interviews

Herb Lin: The Neglected Cyber ​​Security

interview with Herbert Linvia PROSA
Friday, March 13, 2020

Hoover fellow Herb Lin discusses cyber-security.

FeaturedNational Security

Cyber Strategy And Talent

by Jacquelyn Schneidervia Lawfare
Friday, March 13, 2020

Central to the 2018 National Cyber Strategy and the 2018 Department of Defense Cyberspace Strategy is how to recruit, retain and utilize a talented cyber workforce. Both strategies tackle talent head-on, calling for programs that streamline hiring, create rotational work opportunities, institutionalize cyber talent as core competencies within the U.S. government, and outline short-term training and long-term educational investments to create, develop and sustain the cyber workforce. 

Pages

Watch the LiveStream!