Center’s New Amicus Brief in Epic v. Google: Competition Should Not Come at the Expense of Cybersecurity

In too many competition cases, cybersecurity has become an afterthought - the Center is seeking to halt this trend filing a series of amicus briefs seeking to educate the courts about core security consideration to correct lower-court overreach.

AI Governance in Latin America

Artificial intelligence is no longer a technology of the future, it is already transforming how societies function. But these tools need some level of oversight and this is explored in the latest white paper from the Digi Americas Alliance.

Offensive Cyber Operations

Tuesday, August 26, 2025

European Commission 2028-2034 Budget Proposal Includes Substantial Increase for Cyber, Digital Programmes

The European Commission presented its initial proposal for the European Union’s 2028-2034 financial framework that, if approved, could authorise nearly EUR 2 trillion in spending over seven years for cyber and other digital efforts.

State, Fed Cyber Leaders Discuss Resilience in Light of Evolving Threat, Budget Landscapes

State and federal cyber leaders convened in Austin to discuss the Texas Cyber Command, utilizing Zero Trust strategies in an era of AI, and improving Federal to State cyber cooperation in an era of constricting resources and increased threats.

How Existing Security Frameworks Can Help Meeting Bulk Data Rule Security Requirements

The DOJ bulk data rule prohibits certain transactions involving the sale or transfer of sensitive data. This post examines the security requirements and explains their interaction with existing cybersecurity and risk management frameworks and regs.

Recap: Threat Intelligence Forum

The U.S. Chamber of Commerce convened the Threat Intelligence Forum bringing together leaders from government and industry for in-depth discussions on the latest strategies and innovations shaping the market.

NIST: Analyzing Collusion Threats in the Semiconductor Supply Chain

Semiconductors power our modern technology and are often considered “the oil of the 21st century.” But producing these chips is not without challenges to the supply chain, including IP theft, counterfeiting, and reverse engineering.

CCPL Report: Ensuring the Longevity of the CVE Program

Because the future of the CVE program faces some uncertainty it’s time to start a dialogue about the future of the program. This report is designed to provide that starting point.

Congress’ Proposed Chip Security Act Threatens to Create New Cyber Vulnerabilities in U.S. Semiconductors

As the U.S. races toward global AI dominance, a new bill aimed at preventing diversion of innovative U.S. semiconductors to China could inadvertently make those very same chips less secure.