How attackers use open source intelligence against enterprises |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2021 |
Impact of COVID-19 on Cybersecurity |
Socio-economic & Political Responses |
Governance & Institutions |
|
Flicking the kill switch: governments embrace internet shutdowns as a form of control |
System State, Scientific & Technology Responses, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2022 |
Cyber Insurance for Civil Nuclear Facilities: Risks and Opportunities |
Socio-economic & Political Responses |
Governance & Institutions |
2019 |
Identifying Law Enforcement Needs for Conducting Criminal Investigations Involving Evidence on the Dark Web |
System Problems |
Governance & Institutions |
2019 |
Many Hands in the Cookie Jar Case: Studies in Response Options to Cyber Incidents Affecting U.S. Government Networks and Implications for Future Response |
System State, Socio-economic & Political Responses |
Cyber-IR, Conflict & War |
2022 |
Data Incoming: How to Close the Cyber Data Gap |
System Problems |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2022 |
RESTRICT Act explained: proposed TikTok ban is 'a PATRIOT Act for the digital age,' some lawmakers say |
System State, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
|
Why Mexican Cyber-Cartels Threaten U.S. National Security |
System State, System Problems, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2021 |
Modernizing Cyber Defense for the U.S. Navy |
System State, System Problems, Scientific & Technology Responses, Socio-economic & Political Responses |
Conflict & War, Cybersecurity & Sustainability |
2023 |
Sabotage and War in Cyberspace |
System State, System Problems, Scientific & Technology Responses |
Conflict & War |
2022 |
The Navy Still Suffers from Cybersecurity Complacency |
System State, System Problems, Scientific & Technology Responses |
Conflict & War, Cybersecurity & Sustainability |
2023 |
Supply Chain and Network Security for Military 5G Networks |
Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2022 |
Military Movement: Risks from 5G Networks |
System State, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2022 |
Artificial Intelligence and Autonomy in the Military: An Overview of NATO Member States’ Strategies and Deployment |
System State, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Conflict & War |
2022 |
China’s Approach to Military 5G Networks and Related Military Applications |
System State, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Conflict & War, Cybersecurity & Sustainability |
2023 |
India and Cyber Power: The Imperative of Offensive Cyber Operations |
System State, Scientific & Technology Responses, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2022 |
Russia’s Wartime Cyber Operations in Ukraine: Military Impacts, Influences, and Implications |
System Problems, Scientific & Technology Responses, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Conflict & War, Cybersecurity & Sustainability |
2022 |
Ukraine gears up for new phase of cyber war with Russia |
System State, System Problems, Socio-economic & Political Responses |
Cyber-IR, Conflict & War, Cybersecurity & Sustainability |
2023 |
In the Middle East, War Is Going Digital |
System State, System Problems, Scientific & Technology Responses |
Cyber-IR, Conflict & War, Cybersecurity & Sustainability |
2021 |
North Korea Knows How Important Its Cyberattacks Are |
System State, Socio-economic & Political Responses |
Cyber-IR, Conflict & War |
2022 |
The Cyber Resilience Index: Advancing Organizational Cyber Resilience |
System Problems, Socio-economic & Political Responses |
Governance & Institutions |
2022 |
How to hack the hackers: The human side of cybercrime |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2016 |
Moving the Encryption Policy Conversation Forward |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2019 |
Cyber War and Ukraine |
System State, Socio-economic & Political Responses |
Cyber-IR, Conflict & War |
2022 |
How will the US counter cyber threats? Our experts mark up the National Cybersecurity Strategy |
System State, Scientific & Technology Responses, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
United States’ and China’s Cybersecurity Policies: Collaboration or Confrontation? |
System Problems, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2021 |
Users are not stupid: Six cyber security pitfalls overturned |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2022 |
CDT Comments on Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) |
Socio-economic & Political Responses |
Cybersecurity & Sustainability |
2022 |
International cooperation is key to fighting threat actors and cybercrime |
System State |
Cyber-IR, Governance & Institutions |
2022 |
Africa must act now to address cybersecurity threats. Here's why |
Socio-economic & Political Responses |
Governance & Institutions |
2023 |
Raising the Political Priority of Cybersecurity in Latin America |
System Problems |
Governance & Institutions |
2023 |
China’s Cyber Capabilities ‘Pose a Serious Threat’ to US, Advisory Panel Warns |
System State |
Cyber-IR |
2022 |
Taiwan’s Offensive Cyber Capabilities and Ramifications for a Taiwan-China Conflict |
System State |
Conflict & War |
2022 |
China’s Cybersecurity Industry: A Market Analysis |
System Problems, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2022 |
Biden team unveils new anti-cyberattack strategy |
Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Cyberattacks are reshaping modern warfare. How can countries and companies protect themselves? |
System Problems, Scientific & Technology Responses |
Cybersecurity & Sustainability |
2022 |
Cyber Security without Cyber War |
System State |
Cyber-IR, Governance & Institutions, Conflict & War |
2012 |
Advancing Zero Trust Maturity Throughout the User Pillar |
System State |
Cyber-IR |
2023 |
Israel Defense Forces and National Cyber Defense |
System State |
Governance & Institutions |
2020 |
2020 Thematic Brief: US Cybersecurity Efforts |
System State |
Cyber-IR |
2020 |
TikTok Has Your Data Even If You've Never Used the App: Report. |
Socio-economic & Political Responses |
Cybersecurity & Sustainability |
2023 |
Hacking Healthcare: With 385m Patient Records Exposed, Cybersecurity Experts Sound Alarm on Breach Surge. |
System Problems, Scientific & Technology Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2022 |
Lessons from Russia's Cyber-War in Ukraine |
System State, Scientific & Technology Responses, Socio-economic & Political Responses |
Governance & Institutions, Conflict & War, Cybersecurity & Sustainability |
2022 |
Chatgpt and More: What Ai Chatbots Mean for the Future of Cybersecurity |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2023 |
#StopRansomware: Ransomware Attacks on Critical Infrastructure Fund DPRK Malicious Cyber Activities |
System State |
Cyber-IR, Governance & Institutions |
2023 |
The role of human insight in AI-based cybersecurity |
Socio-economic & Political Responses |
Cybersecurity & Sustainability |
2023 |
The Role of Human Error in Successful Cyber Security Breaches |
System Problems |
Cyber-IR |
2022 |
The Liberal Cyber Order |
System State, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
|
Forget the IoT. Meet the IoZ: our Internet of Zombie things |
System State |
Cyber-IR |
2023 |