Poison, Persistence, and Cascade Effects: AI and Cyber Conflict |
Socio-economic & Political Responses |
Governance & Institutions, Conflict & War |
2020 |
10 Notable Cyber Attacks on Government Agencies |
System State, Socio-economic & Political Responses |
Governance & Institutions |
2022 |
Mexico is one of the top victims of cyberattacks in Latin America |
System State, System Problems |
Governance & Institutions |
2022 |
Data Sovereignty in a Reglobalized World |
System Problems, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
|
Privacy megatrends: Rise of privacy enforcement |
System Problems, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
|
Synthetic Data Is About To Transform Artificial Intelligence |
System Problems, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
|
The Cyber Defense Matrix |
System State, Scientific & Technology Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
|
10 Notable Cyber Attacks on Government Agencies |
System State, Socio-economic & Political Responses |
Governance & Institutions |
2022 |
Security leaders weigh in on school district ransomware attack |
System State |
Governance & Institutions |
2023 |
Africa in the news: Ethiopia, Nigeria, and internet control updates |
System State, System Problems, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Conflict & War |
2021 |
Cyber Resilience Must Focus On Marginalized Individuals, Not Just Institutions |
System Problems, Scientific & Technology Responses, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Why Does the Global Spyware Industry Continue to Thrive? Trends, Explanations, and Responses |
System State, System Problems, Scientific & Technology Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Phase-based Tactical Analysis of Online Operations |
System State, System Problems, Scientific & Technology Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
African Union Bugged by China: Cyber Espionage as Evidence of Strategic Shifts |
System State, System Problems, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2018 |
What Business Needs to Know About the New U.S. Cybersecurity Strategy |
System State, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Technological Change and International Relations |
System State, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2019 |
How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument |
System State, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2017 |
The Three Top Issues to Address for the Global Cybercrime Treaty |
System State, Socio-economic & Political Responses |
Governance & Institutions |
2023 |
Once More, With Feeling: Security Research Should Not Be Chilled by Uncertainty in Copyright Law |
Scientific & Technology Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2020 |
Live Free or Die Hard: U.S.-UK Cybersecurity Policies |
System Problems, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2016 |
What’s important to CISOs in 2023 |
System Problems |
Governance & Institutions |
2023 |
Japanese hospitals increasingly at risk of cyberattacks |
System Problems, Socio-economic & Political Responses |
Governance & Institutions |
2021 |
A Shared Responsibility: Public-Private Cooperation for Cybersecurity |
System State |
Governance & Institutions |
2022 |
How China built a one-of-a-kind cyber-espionage behemoth to last |
Scientific & Technology Responses |
Governance & Institutions |
2022 |
Inside the plan to fix America’s never-ending cybersecurity failures |
System Problems, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2022 |
Data and public-private partnerships are the future of cybersecurity |
System State |
Governance & Institutions |
2023 |
Cybersecurity Policies - European Commission |
System State |
Cyber-IR, Governance & Institutions |
2022 |
The UN Cybercrime Treaty Has a Cybersecurity Problem In It |
System Problems, Socio-economic & Political Responses |
Governance & Institutions |
2022 |
A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks |
System State |
Governance & Institutions |
2022 |
SEVA: A Smart Electronic Voting Application Using Blockchain Technology |
Scientific & Technology Responses |
Governance & Institutions |
2021 |
Edge Security for SIP-enabled IoT Devices with P4 |
System State |
Governance & Institutions, Cybersecurity & Sustainability |
2021 |
CYBER DEFENSE ACROSS THE OCEAN FLOOR The Geopolitics of Submarine Cable Security |
System State, System Problems |
Cyber-IR, Governance & Institutions, Conflict & War |
2021 |
The war never ends on the cyber front |
System State, Socio-economic & Political Responses |
Governance & Institutions, Conflict & War |
2022 |
Biden to private sector: Cybersecurity is your responsibility—not the user’s |
Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Targeted Human Trafficking – The Wars between Proxy and Surrogated Economy |
Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2022 |
No-go zones: Ethical geographies of the surveillance industry |
System State, System Problems |
Cyber-IR, Governance & Institutions |
2017 |
Cyber breach reporting to be required by law for better cyber defense |
Socio-economic & Political Responses |
Governance & Institutions |
2022 |
Current MFA Fatigue Attack Campaign Targeting Microsoft Office 365 Users |
System Problems, Scientific & Technology Responses |
Governance & Institutions |
2023 |
Cybersecurity Convergence: Digital Human and National Security |
System State, System Problems |
Cyber-IR, Governance & Institutions |
2020 |
The perilous path to a new cybercrime treaty |
System State, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2023 |
U.S. Unveils New Cybersecurity Strategy with Tighter Regulations |
System Problems |
Cyber-IR, Governance & Institutions |
2023 |
Hackers Take Control of Government-Owned Satellite in Alarming Experiment |
System Problems |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Cyber Security: Global Food Supply Chain at Risk from Malicious Hackers |
System Problems, Scientific & Technology Responses |
Cyber-IR, Governance & Institutions |
2022 |
Analysis | The Perilous Path to a New Cybercrime Treaty. |
Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
US Cyber Officials Make Urgent Push to Warn Businesses about Vulnerabilities to Hackers |
System Problems |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2023 |
New UN cybercrime convention has a long way to go in a tight timeframe |
Socio-economic & Political Responses |
Governance & Institutions |
2023 |
Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and Default |
System Problems |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
An Interface without A User: An Exploratory Design Study of Online Privacy Policies and Digital Legalese |
Scientific & Technology Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2018 |
IBM Security X-Force Threat Intelligence Index 2023 |
System Problems, Scientific & Technology Responses |
Governance & Institutions |
2023 |
Good practices in innovation on Cybersecurity under the NCSS (National Cyber Security Strategies) |
System State, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2019 |