This volume explores the contemporary challenges to US national cybersecurity.

Taking stock of the field, it features contributions by leading experts working at the intersection between academia and government and offers a unique overview of some of the latest debates about national cybersecurity. These contributions showcase the diversity of approaches and issues shaping contemporary understandings of cybersecurity in the West, such as deterrence and governance, cyber intelligence and big data, international cooperation, and public–private collaboration. The volume’s main contribution lies in its effort to settle the field around three main themes exploring the international politics, concepts, and organization of contemporary cybersecurity from a US perspective. Related to these themes, this volume pinpoints three pressing challenges US decision makers and their allies currently face as they attempt to govern cyberspace: maintaining international order, solving conceptual puzzles to harness the modern information environment, and coordinating the efforts of diverse partners.

The volume will be of much interest to students of cybersecurity, defense studies, strategic studies, security studies, and IR in general. 

chapter 1|8 pages


part I|70 pages

The international politics of cybersecurity

chapter 2|17 pages

Cybersecurity and cross-domain deterrence

The consequences of complexity

chapter 3|12 pages

Crossing the Rubicon

Identifying and responding to an armed cyberattack 1

chapter 5|24 pages

Developing an international cyberspace governance framework

Comparisons to outer space

part II|74 pages

Conceptualizing cybersecurity

chapter 6|10 pages

Traditional military thinking in cyberspace

The need for adaptation

chapter 8|13 pages

The innovator’s challenge

Can the US Army learn to out-hack those who attack us in cyberspace?

chapter 10|13 pages

Changing the game

Cyberspace and big data-driven national security intelligence

part III|58 pages

Organizing cybersecurity

chapter 11|22 pages

Cybersecurity in the United States and the United Kingdom

The need for trust and cooperation

chapter 12|18 pages

From information to cybersecurity

Bridging the public–private divide

chapter 13|11 pages

Training coalitions on cyber intelligence capability

Building capability through familiarity and relationships

chapter 14|5 pages