Skip to content
ITIF Logo
ITIF Search

Cybersecurity

As every sector of the global economy and nearly every facet of modern society undergo digital transformation, ITIF advocates for policies that spur not just the development of IT innovations, but more importantly their adoption and use throughout the economy. In the area of cybersecurity, ITIF studies how governments and the private sector can improve the security and resiliency of computers and networks.

Daniel Castro
Daniel Castro

Vice President and Director, Center for Data Innovation

Information Technology and Innovation Foundation

Read Bio
Ash Johnson
Ash Johnson

Senior Policy Manager

Information Technology and Innovation Foundation

Read Bio
David Kertai
David Kertai

Research Assistant

Read Bio

Featured

Europe’s Cloud Security Regime Should Focus on Technology, Not Nationality

Europe’s Cloud Security Regime Should Focus on Technology, Not Nationality

The EU’s new cloud cybersecurity regime should focus on good security practices, as the U.S. FedRAMP regime does. Emulating China’s protectionist focus on firm nationality is a bad security practice that weakens transatlantic influence over cybersecurity issues globally.

The Effect of International Proposals for Monitoring Obligations on End-To-End Encryption

The Effect of International Proposals for Monitoring Obligations on End-To-End Encryption

European and U.S. policymakers have proposed imposing monitoring obligations on Internet intermediaries to improve online safety. Despite their best efforts, these proposals risk undermining users’ privacy by eliminating the use of end-to-end encryption. Therefore, policymakers should not pursue them.

More Publications and Events

October 21, 2025|Blogs

Europe’s Cyber Blueprint is a Model for Regional Cybersecurity Cooperation

The EU’s Cyber Crisis Management Blueprint establishes a coordinated framework for member states to prevent, respond to, and recover from large-scale cyber incidents, strengthening resilience, interoperability, and operational readiness while providing a model for other regional institutions.

October 20, 2025|Reports & Briefings

EU Should Improve Transparency in the Digital Services Act

The implementation of the Digital Services Act’s transparency obligations fails to provide meaningful insight into online platforms’ content moderation decisions, the extraterritorial effects of the act, and its effects on online speech.

October 3, 2025|Blogs

Congress Needs to Shutdown-Proof CISA

In the short term, Congress should move quickly to reauthorize CISA 2015 and fund the agency’s operations, even if the overall government funding fight continues. Then, to keep CISA fully operational in the future, Congress also should create a dedicated funding stream so the agency doesn’t have to rely so heavily on appropriations.

August 11, 2025|Blogs

Closing the Gaps in the Strengthening Cyber Resilience Act

The Strengthening Cyber Resilience Against State-Sponsored Threats Act is a timely and necessary response to the growing threat posed by state-sponsored cyber actors, particularly from China, but Congress should further refine it to truly future-proof the nation’s cybersecurity posture.

August 1, 2025|Blogs

From Trade Deals to Trojan Horses: China’s Expanding Digital Aggression on Europe

China has spent the last five years escalating a coordinated cyber campaign against Europe—targeting lawmakers, infrastructure, and institutions—even as the EU considers deepening economic ties, exposing a dangerous contradiction in its approach to Beijing.

July 29, 2025|Blogs

Hardening US Infrastructure Before a Potential Iranian Cyber Attack

Iran’s growing cyber capabilities, combined with recent geopolitical tensions, pose a serious threat to U.S. critical infrastructure, requiring urgent federal action to strengthen digital defenses and build long-term resilience.

June 23, 2025|Presentations

How the EU’s Digital Markets Act Could Undermine Security across Mobile Operating Systems

Joseph Coniglio speaks about the Digital Markets Act and cybersecurity at a panel hosted by the European Centre for International Political Economy.

June 16, 2025|Blogs

Texas’s New Cyber Command Offers a Model for Other States

Texas's new Cyber Command Center strengthens defenses against rising cyber threats and builds a long-term cybersecurity workforce—offering a model other states can follow.

May 2, 2025|Blogs

Chinese Payment Platforms Present Risk and a Reciprocity Gap

The increasing presence of Chinese payment platforms in the U.S. market raises significant concerns around three risks: economic competition, censorship, and national security.

April 30, 2025|Blogs

Congress Should Fund the Cybersecurity and Infrastructure Security Agency

Despite the importance of protecting critical infrastructure from a growing array of digital threats, some members of Congress want to cut funding for the federal agency responsible for cybersecurity in its upcoming budget.

Back to Top