Jason Healey

User banner image
User avatar
  • Jason Healey

Posts

The National Cybersecurity Strategy: Breaking a 50-Year Losing Streak

Editor’s Note: This piece is the second in a two-part series about White House cybersecurity policies. Part 1 of the series can be found here....

Twenty-Five Years of White House Cyber Policies

Editor’s Note: This piece is the first in a two-part series about White House cybersecurity policies. Part 2 of this series will be published in...

The Lingering Power of Cyber Brandishing

Academics are among those who have oversimplified that “brandishing a cyber capability for signaling purposes is counterproductive when, by the very act of revealing it,...

Cyber Operations and Maschmeyer’s “Subversion Trilemma”

Will cyber operations be a major factor in international relations, or a relative sideshow? A major article in the Fall 2021 issue of International Security...

Soldiers, Statesmen and Cyber Crises: Cyberspace and Civil-Military Relations

The internet, at the core of cyberspace, was designed to be non-hierarchical, based on substantial trust, with no privileged role for governments and no sovereignty...

Understanding the Offense’s Systemwide Advantage in Cyberspace

The Cybersecurity and Infrastructure Security Agency released on Dec. 11 a statement on the massive log4j vulnerability, one of the worst the internet has ever...

When Should U.S. Cyber Command Take Down Criminal Botnets?

Trickbot is back.  U.S. Cyber Command targeted this malware in autumn 2020 in an unprecedented use of military offensive cyber operations to disrupt a purely...