U.S. and Dominican Republic to face shared threats in cyberspace |
Socio-economic & Political Responses |
Cyber-IR, Cybersecurity & Sustainability |
2022 |
Constella Intelligence 2023 Identity Breach Report: The Explosion of Infostealer Botnets on the Dark Web Threatening Individuals and Corporate Networks |
Socio-economic & Political Responses |
Conflict & War, Cybersecurity & Sustainability |
|
Cyber Certainty: Investing in Resilience During a Post-Correction Market |
Socio-economic & Political Responses |
Cybersecurity & Sustainability |
|
Data Sovereignty in a Reglobalized World |
System Problems, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
|
Privacy megatrends: Rise of privacy enforcement |
System Problems, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
|
Synthetic Data Is About To Transform Artificial Intelligence |
System Problems, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
|
The Cyber Defense Matrix |
System State, Scientific & Technology Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
|
Synthetic Data Is About To Transform Artificial Intelligence |
System Problems |
Cybersecurity & Sustainability |
|
Cyber Resilience Must Focus On Marginalized Individuals, Not Just Institutions |
System Problems, Scientific & Technology Responses, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Why Does the Global Spyware Industry Continue to Thrive? Trends, Explanations, and Responses |
System State, System Problems, Scientific & Technology Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Phase-based Tactical Analysis of Online Operations |
System State, System Problems, Scientific & Technology Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
What Business Needs to Know About the New U.S. Cybersecurity Strategy |
System State, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Cybersecurity Insurance A No-brainer Even for Small Firms |
System Problems |
Cybersecurity & Sustainability |
2019 |
Once More, With Feeling: Security Research Should Not Be Chilled by Uncertainty in Copyright Law |
Scientific & Technology Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2020 |
The Duality of Cyber Protection: Cybersecurity and (or) Cyber Insurance? |
System State |
Cybersecurity & Sustainability |
2023 |
Trends and Best Practices in Health Care Cybersecurity Insurance Policy |
System Problems |
Cybersecurity & Sustainability |
2020 |
The Invisible Hole of Cybersecurity Insurance Services |
System Problems |
Cybersecurity & Sustainability |
2020 |
Live Free or Die Hard: U.S.-UK Cybersecurity Policies |
System Problems, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2016 |
What is Data Breach or Cyber Security Insurance? |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2018 |
The role of cybersecurity law for sustainability of innovative smart homes (Goal 9) |
System Problems, Socio-economic & Political Responses |
Cybersecurity & Sustainability |
2022 |
Edge Security for SIP-enabled IoT Devices with P4 |
System State |
Governance & Institutions, Cybersecurity & Sustainability |
2021 |
Synchronizing DDoS defense at network edge with P4, SDN, and Blockchain |
System State |
Cybersecurity & Sustainability |
2022 |
Biden to private sector: Cybersecurity is your responsibility—not the user’s |
Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Pandas with a Soul: Chinese Espionage Attacks Against Southeast Asian Government Entities |
System State, System Problems |
Cybersecurity & Sustainability |
2023 |
BingBang – A New Bing Vulnerability that Can be Exploited Without Executing a code |
System Problems, Scientific & Technology Responses |
Cybersecurity & Sustainability |
2023 |
Cracking 2.3M Attackers-Supplied Credentials: What Can We Learn from RDP Attacks |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2022 |
A review on cybersecurity vulnerabilities for unmanned aerial vehicles |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2017 |
Microsoft lets generative AI loose on cybersecurity |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2023 |
CyberSecurity considerations for an interconnected self-driving car system of systems |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2017 |
Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2022 |
Drones for smart cities: Issues in cybersecurity, privacy, and public safety |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2016 |
Hackers Take Control of Government-Owned Satellite in Alarming Experiment |
System Problems |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
New SLP Vulnerability Could Let Attackers Launch 2200x Powerful DDoS Attacks |
System Problems |
Cybersecurity & Sustainability |
2023 |
Analysis | The Perilous Path to a New Cybercrime Treaty. |
Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
New Dark Web Market Styx Focuses on Financial Fraud Services |
System Problems, Scientific & Technology Responses |
Cybersecurity & Sustainability |
2023 |
Cyber Risk Profile of a Merger or Acquisition |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
|
How Secure Is Your Health Information? Electronic Medical Record Vulnerability Discovery |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
|
Addressing Deepfake-Enabled Attacks Using Security Controls |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
|
Is Your Cloud Environment Secure? How Do You Know? |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
|
US Cyber Officials Make Urgent Push to Warn Businesses about Vulnerabilities to Hackers |
System Problems |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Ban the bug? |
Socio-economic & Political Responses |
Cybersecurity & Sustainability |
2017 |
Management models for international cybercrime |
Socio-economic & Political Responses |
Cybersecurity & Sustainability |
2015 |
Cyber risk and cybersecurity: a systematic review of data availability |
System Problems, Scientific & Technology Responses |
Cybersecurity & Sustainability |
2022 |
Beyond the Hype: AI in your SOC |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2020 |
The Impact of Quantum Computing on Present Cryptography |
System Problems |
Cybersecurity & Sustainability |
2018 |
Cybersecurity for the IoT: How trust can unlock value |
System Problems, Scientific & Technology Responses |
Cybersecurity & Sustainability |
2023 |
Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Security-by-Design and Default |
System Problems |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
An Interface without A User: An Exploratory Design Study of Online Privacy Policies and Digital Legalese |
Scientific & Technology Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2018 |
Google Cloud Threat Horizons Report 2023 |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2023 |
Cybersecurity & Innovation: The Key to a Secure Future |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2021 |