DNS Security in Focus: RSA Conference 2025

The Center hosted a roundtable to exam how protective DNS, DNSSEC, and encrypted transports can be scaled across government and industry, aligning with different cybersecurity frameworks.

To Hack Back, or Not Hack Back? That is the Question … or is it?

The U.S. is facing a new era of digital conflict where cyberattacks are persistent campaigns targeting critical infrastructure. In response, calls to embrace offensive cyber have grown as questions and challenges around these capabilities are raised.

Competition and Security Need to Go Hand-in-Hand

In an amicus curiae brief filed in United States v. Google, the Center urges the Court to account for cybersecurity – and public safety – in mandating remedies for the case.

Addressing IT Concentration Risk in the Australian Government

The Center and Australian officials conducted a multi-stakeholder tabletop exercise, with the intent to explore concentration risk within the Australian Government’s IT environments.

RSA Readout: Asia-Pacific

Government and cybersecurity leaders from Asia-Pacific addressed the region’s growing role in digital transformation, its exposure to geostrategic competition and cross-border threats, and efforts to harmonize cybersecurity policies and practices.

RSA Readout: Europe

European policymakers have expressed concerns about their dependence on foreign technology for certain critical capabilities. During conversations around the RSA Conference stakeholders dove into this topic and what the future may hold.

The Center for Cybersecurity Policy and Law's Amicus Brief - United States Vs. Google, LLC

The Center for Cybersecurity Policy and Law's Amicus Brief - United States Vs. Google, LLC

Aligning AI and Cybersecurity: Takeaways from a Discussion on the UK’s New AI Cyber Security Code of Practice

In a workshop hosted by the Center for Cybersecurity Policy & Law and Alliance for Trust in AI (ATAI), stakeholders from government, academia, and industry gathered to discuss the UK’s new AI Cyber Security Code of Practice.

REAL ID No Longer Focuses on Most Pressing Problems

As REAL ID full enforcement begins, I am left wondering how the government will address the more pressing identity threats in the digital world.

It’s Time for the Insurance Industry to Get Creative with Incident Response

Companies are adopting baseline tools to thwart attackers leading but one tool often overlooked is Protective DNS. PDNS can intercept malicious queries in real time, blocking access to known or malicious domains before harm is done.