Cybersecurity
Navigate forward to interact with the calendar and select a date. Press the question mark key to get the keyboard shortcuts for changing dates.
Navigate backward to interact with the calendar and select a date. Press the question mark key to get the keyboard shortcuts for changing dates.
As every sector of the global economy and nearly every facet of modern society undergo digital transformation, ITIF advocates for policies that spur not just the development of IT innovations, but more importantly their adoption and use throughout the economy. In the area of cybersecurity, ITIF studies how governments and the private sector can improve the security and resiliency of computers and networks.

Vice President and Director, Center for Data Innovation
Information Technology and Innovation Foundation
Read BioFeatured
The Effect of International Proposals for Monitoring Obligations on End-To-End Encryption

European and U.S. policymakers have proposed imposing monitoring obligations on Internet intermediaries to improve online safety. Despite their best efforts, these proposals risk undermining users’ privacy by eliminating the use of end-to-end encryption. Therefore, policymakers should not pursue them.
More Publications and Events
June 16, 2025|Blogs
Fact of the Week: Data Flow and Data Storage Prohibitions Could Have Sizeable Impact on Global GDP
When local data storage regulations are open or with pre-authorized safeguards, global exports are expected to rise by 3.6 percent and global gross domestic product (GDP) is expected to increase by 1.77 percent. When regulations are more stringent against different geopolitical blocs, global exports are expected to decline by 1.76 percent while GDP is expected to fall by 0.94 percent. Regulations that prohibit the flow of data also have a sizable impact with exports declining by 8.45 percent and GDP declining by 4.53 percent.
June 16, 2025|Blogs
Texas’s New Cyber Command Offers a Model for Other States
Texas's new Cyber Command Center strengthens defenses against rising cyber threats and builds a long-term cybersecurity workforce—offering a model other states can follow.
May 2, 2025|Blogs
Chinese Payment Platforms Present Risk and a Reciprocity Gap
The increasing presence of Chinese payment platforms in the U.S. market raises significant concerns around three risks: economic competition, censorship, and national security.
April 30, 2025|Blogs
Congress Should Fund the Cybersecurity and Infrastructure Security Agency
Despite the importance of protecting critical infrastructure from a growing array of digital threats, some members of Congress want to cut funding for the federal agency responsible for cybersecurity in its upcoming budget.
April 29, 2025|Testimonies & Filings
Testimony to the Alaska State Legislature Regarding AI, Deepfakes, Cybersecurity, and Data Transfers
Advancements in AI are creating many opportunities to use the technology for beneficial purposes across virtually every sector, and people will undoubtedly find many useful applications for AI in elections and government agencies in the years ahead.
April 16, 2025|Reports & Briefings
An IT Policy Playbook for Canada
The Canadian economy is shifting faster than its institutions are. This playbook lays out an agenda to address what Canada must fix, build, and scale in order to compete through technology.
April 11, 2025|Blogs
Why the US Should Block Piracy
The Foreign Anti-Digital Piracy Act (FADPA) would let U.S. courts block access to foreign piracy sites that profit off stolen American content, aligning the U.S. with over 40 countries that already take similar action. Despite critics' claims of censorship, the bill targets only sites primarily designed for copyright theft, offering a lawful, narrow solution to a billion-dollar problem.
April 9, 2025|Testimonies & Filings
Comments Before the House Committee on Energy and Commerce Regarding Data Privacy
A reasonable compromise on federal data privacy should protect and promote innovation by minimizing compliance costs and restrictions on data use, as well as address concrete privacy harms, improve transparency requirements, and strengthen oversight and enforcement.
March 13, 2025|Presentations
The Future of Online Safety for Kids: Legislative Changes on the Horizon
Ash Johnson speaks about children's online safety at an event hosted by the Congressional Internet Caucus Academy.
February 13, 2025|Blogs
Salt Typhoon Exposes US Cyber Vulnerabilities
To strengthen U.S. cybersecurity leadership and effectively counter cyber threats, the administration should enhance interagency coordination with a central cybercrime database, collaborate with the private sector to address cybersecurity gaps in critical infrastructure, standardize data breach reporting, and build international coalitions for global cyber norms.