Cybersecurity
Navigate forward to interact with the calendar and select a date. Press the question mark key to get the keyboard shortcuts for changing dates.
Navigate backward to interact with the calendar and select a date. Press the question mark key to get the keyboard shortcuts for changing dates.
As every sector of the global economy and nearly every facet of modern society undergo digital transformation, ITIF advocates for policies that spur not just the development of IT innovations, but more importantly their adoption and use throughout the economy. In the area of cybersecurity, ITIF studies how governments and the private sector can improve the security and resiliency of computers and networks.
Featured
The Effect of International Proposals for Monitoring Obligations on End-To-End Encryption

European and U.S. policymakers have proposed imposing monitoring obligations on Internet intermediaries to improve online safety. Despite their best efforts, these proposals risk undermining users’ privacy by eliminating the use of end-to-end encryption. Therefore, policymakers should not pursue them.
More Publications and Events
May 11, 2026|Blogs
Pre-Approval for AI Models Would Slow Innovation Without Improving Safety
Requiring government approval before releasing advanced AI models would slow innovation, politicize AI development, and weaken U.S. competitiveness. Instead, policymakers should focus on collaborative safety efforts and strengthening cybersecurity.
May 4, 2026|Blogs
States Should Learn From Each Other to Close Cybersecurity Gaps
Cyberattacks are rising across state and local governments, and the blog recommends that all states adopt coordinated strategies, clear standards, and stronger cyber capabilities to close security gaps and improve resilience.
April 27, 2026|Reports & Briefings
Improving State and Local Government Cybersecurity
State and local governments face rising cybersecurity risks that strain budgets, disrupt services, and erode public trust. Governments need targeted investments in modern infrastructure, continuous monitoring, and stronger third-party risk management to protect critical services.
April 27, 2026|Reports & Briefings
From Sovereignty to Control: A Clear-Eyed View of Canadian Cloud Policy
Canada’s cloud debate is asking the wrong question—control, not domestic ownership or server location, is what determines security and resilience in practice.
April 17, 2026|Blogs
Federal Government Should Partner With Frontier AI Labs on Cybersecurity Defense
While the U.S. has focused on securing AI systems themselves, it must urgently shift toward using AI defensively—through coordinated government, industry, and infrastructure efforts—to counter the growing threat of AI-powered cyberattacks on existing systems.
March 30, 2026|Blogs
Health Care Is Getting a Cybersecurity Upgrade—Other Sectors Should Too
Cyberattacks on critical infrastructure—particularly health care—are escalating, and Congress should pass the Health Care Cybersecurity and Resiliency Act and expand similar sector-specific cybersecurity programs across all critical infrastructure sectors to provide tailored funding, guidance, and support.
February 9, 2026|Blogs
America’s Cyber Withdrawal Needs a Replacement
The Trump administration’s withdrawal from international cybersecurity forums like the GFCE and Hybrid CoE risks creating gaps in global coordination, early warning, and norm-setting. Strategic disengagement must be paired with replacement mechanisms to preserve multilateral cyber capacity, maintain allied cohesion, and safeguard U.S. interests.
December 10, 2025|Reports & Briefings
How the Proposed UK Cyber Security and Resilience Bill Can Unlock Growth in the Nation’s Cyber Insurance Market
The UK’s proposed Cyber Security and Resilience Bill presents a much-needed opportunity to kickstart the growth of the UK’s lagging cyber insurance market, which will make businesses more resilient to the increasing frequency and significance of cyberattacks.
November 26, 2025|Blogs
Policymakers Should Protect Consumers from Scammers’ Phishing Hooks
Transnational scam networks, often based in Southeast Asia and exploiting weak governance, have stolen billions from U.S. consumers, and effectively combating them requires bipartisan legislation, stronger public-private coordination, and sustained international cooperation.
November 4, 2025|Blogs
National Cyber Director Cairncross Is Right to Emphasize Preemptive Cyber Defense
National Cyber Director Sean Cairncross has outlined a shift toward proactive cyber deterrence, and to make it effective, he should modernize CISA 2015, secure long-term federal leadership of the CVE program, and strengthen cybersecurity coordination with U.S. allies.




