Beyond Hyperbole: The Evolving Subdiscipline of Cyber Conflict Studies |
System Problems |
Conflict & War |
2020 |
Mexico is one of the top victims of cyberattacks in Latin America |
System State, System Problems |
Governance & Institutions |
2022 |
Data Sovereignty in a Reglobalized World |
System Problems, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
|
Privacy megatrends: Rise of privacy enforcement |
System Problems, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
|
Synthetic Data Is About To Transform Artificial Intelligence |
System Problems, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
|
Synthetic Data Is About To Transform Artificial Intelligence |
System Problems |
Cybersecurity & Sustainability |
|
FBI arrests 21-year-old Air Force guardsman in Pentagon leak case |
System Problems |
Cyber-IR |
2023 |
Africa in the news: Ethiopia, Nigeria, and internet control updates |
System State, System Problems, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Conflict & War |
2021 |
Cyber Resilience Must Focus On Marginalized Individuals, Not Just Institutions |
System Problems, Scientific & Technology Responses, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Why Does the Global Spyware Industry Continue to Thrive? Trends, Explanations, and Responses |
System State, System Problems, Scientific & Technology Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Phase-based Tactical Analysis of Online Operations |
System State, System Problems, Scientific & Technology Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
U.S. Cyber Deterrence: Bringing Offensive Capabilities into the Light |
System State, System Problems, Socio-economic & Political Responses |
Cyber-IR, Conflict & War |
2022 |
African Union Bugged by China: Cyber Espionage as Evidence of Strategic Shifts |
System State, System Problems, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2018 |
Cybersecurity Insurance A No-brainer Even for Small Firms |
System Problems |
Cybersecurity & Sustainability |
2019 |
Trends and Best Practices in Health Care Cybersecurity Insurance Policy |
System Problems |
Cybersecurity & Sustainability |
2020 |
The Invisible Hole of Cybersecurity Insurance Services |
System Problems |
Cybersecurity & Sustainability |
2020 |
Live Free or Die Hard: U.S.-UK Cybersecurity Policies |
System Problems, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2016 |
The role of cybersecurity law for sustainability of innovative smart homes (Goal 9) |
System Problems, Socio-economic & Political Responses |
Cybersecurity & Sustainability |
2022 |
What’s important to CISOs in 2023 |
System Problems |
Governance & Institutions |
2023 |
Japanese hospitals increasingly at risk of cyberattacks |
System Problems, Socio-economic & Political Responses |
Governance & Institutions |
2021 |
Inside the plan to fix America’s never-ending cybersecurity failures |
System Problems, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2022 |
The UN Cybercrime Treaty Has a Cybersecurity Problem In It |
System Problems, Socio-economic & Political Responses |
Governance & Institutions |
2022 |
CYBER DEFENSE ACROSS THE OCEAN FLOOR The Geopolitics of Submarine Cable Security |
System State, System Problems |
Cyber-IR, Governance & Institutions, Conflict & War |
2021 |
No-go zones: Ethical geographies of the surveillance industry |
System State, System Problems |
Cyber-IR, Governance & Institutions |
2017 |
Constructing Norms for Global Cybersecurity |
System State, System Problems, Socio-economic & Political Responses |
Cyber-IR, Conflict & War |
2016 |
Pandas with a Soul: Chinese Espionage Attacks Against Southeast Asian Government Entities |
System State, System Problems |
Cybersecurity & Sustainability |
2023 |
BingBang – A New Bing Vulnerability that Can be Exploited Without Executing a code |
System Problems, Scientific & Technology Responses |
Cybersecurity & Sustainability |
2023 |
Current MFA Fatigue Attack Campaign Targeting Microsoft Office 365 Users |
System Problems, Scientific & Technology Responses |
Governance & Institutions |
2023 |
Lazarus Subgroup Targeting Apple Devices with New RustBucket macOS Malware |
System Problems |
Conflict & War |
2023 |
Cybersecurity Convergence: Digital Human and National Security |
System State, System Problems |
Cyber-IR, Governance & Institutions |
2020 |
U.S. Unveils New Cybersecurity Strategy with Tighter Regulations |
System Problems |
Cyber-IR, Governance & Institutions |
2023 |
Hackers Take Control of Government-Owned Satellite in Alarming Experiment |
System Problems |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Cyber Security: Global Food Supply Chain at Risk from Malicious Hackers |
System Problems, Scientific & Technology Responses |
Cyber-IR, Governance & Institutions |
2022 |
New SLP Vulnerability Could Let Attackers Launch 2200x Powerful DDoS Attacks |
System Problems |
Cybersecurity & Sustainability |
2023 |
New Dark Web Market Styx Focuses on Financial Fraud Services |
System Problems, Scientific & Technology Responses |
Cybersecurity & Sustainability |
2023 |
US Cyber Officials Make Urgent Push to Warn Businesses about Vulnerabilities to Hackers |
System Problems |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Cyber risk and cybersecurity: a systematic review of data availability |
System Problems, Scientific & Technology Responses |
Cybersecurity & Sustainability |
2022 |
The Impact of Quantum Computing on Present Cryptography |
System Problems |
Cybersecurity & Sustainability |
2018 |
Cybersecurity for the IoT: How trust can unlock value |
System Problems, Scientific & Technology Responses |
Cybersecurity & Sustainability |
2023 |
Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and Default |
System Problems |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
IBM Security X-Force Threat Intelligence Index 2023 |
System Problems, Scientific & Technology Responses |
Governance & Institutions |
2023 |
The Cost of a Data Breach for Government Agencies |
System Problems |
Cyber-IR |
2022 |
When Botnets Attack |
System Problems |
Cyber-IR |
2022 |
Development of a new ‘human cyber-resilience scale’ |
System Problems, Scientific & Technology Responses |
Cybersecurity & Sustainability |
|
The right to a fair trial as a conceptual framework for digital evidence rules in criminal investigations |
System Problems |
Governance & Institutions |
|
Identifying Law Enforcement Needs for Conducting Criminal Investigations Involving Evidence on the Dark Web |
System Problems |
Governance & Institutions |
2019 |
Data Incoming: How to Close the Cyber Data Gap |
System Problems |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2022 |
Building a Cyber Force is Even Harder Than You Thought |
System State, System Problems, Scientific & Technology Responses |
Conflict & War |
2022 |
Why Mexican Cyber-Cartels Threaten U.S. National Security |
System State, System Problems, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2021 |
Modernizing Cyber Defense for the U.S. Navy |
System State, System Problems, Scientific & Technology Responses, Socio-economic & Political Responses |
Conflict & War, Cybersecurity & Sustainability |
2023 |