Strategic Sufficiency 2.0: Deploying Regional Nuclear Triads

Strategic stability as it was once known is on life support. For those unfamiliar with the concept, strategic stability is a condition of strategic power balance that enables deterrence to function more effectively. The obvious goal of deterrence is conflict prevention and the attendant risks of regional and global nuclear escalation. For over 75 years […]

Strategic Sufficiency 2.0: Deploying Regional Nuclear Triads was originally published on Global Security Review.

August 15, 2024
Read More >>

We wrote the code, and the code won

By Tjaden Hess Earlier this week, NIST officially announced three standards specifying FIPS-approved algorithms for post-quantum cryptography. The Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) is one of these standardized algorithms. The Trail of Bits cryptography team has been anticipating this announcement, and we are excited to share an announcement of our own: we built an […]

August 15, 2024
Read More >>

Interview – Colin Flint

Colin Flint talks about China’s rise, influence in the South China Sea and the Belt and Road initiative, as well as the importance of ports and seapower in geopolitics.

August 15, 2024
Read More >>

Transform the Defender’s Dilemma into the Defender’s Advantage

The notion that cybersecurity defenders are at an inherent disadvantage—the so-called defender’s dilemma—is incorrect and counterproductive. Instead of focusing solely on how we respond to attackers’ tactics, we can identify and use the advantages inherent in our position as defenders. This article explains what a defender-oriented mindset entails and how it can help you strengthen…

Read more

August 15, 2024
Read More >>