Good practices in innovation on Cybersecurity under the NCSS (National Cyber Security Strategies) |
System State, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2019 |
Cyber Threats How financial institutions can mitigate risk |
System State |
Cybersecurity & Sustainability |
|
Recommendations to Defend America’s Election Infrastructure |
Scientific & Technology Responses, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2019 |
How attackers use open source intelligence against enterprises |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2021 |
Development of a new ‘human cyber-resilience scale’ |
System Problems, Scientific & Technology Responses |
Cybersecurity & Sustainability |
|
Civilians 'Defending Forward' in Cyberspace |
System State |
Governance & Institutions, Cybersecurity & Sustainability |
2019 |
Attack-Based Network Defense |
Scientific & Technology Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2021 |
Cybersecurity’s Pearl Harbor Moment: Lessons Learned from the Colonial Pipeline Ransomware Attack |
System State, Scientific & Technology Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2021 |
Data Incoming: How to Close the Cyber Data Gap |
System Problems |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2022 |
Why Mexican Cyber-Cartels Threaten U.S. National Security |
System State, System Problems, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2021 |
Modernizing Cyber Defense for the U.S. Navy |
System State, System Problems, Scientific & Technology Responses, Socio-economic & Political Responses |
Conflict & War, Cybersecurity & Sustainability |
2023 |
The Navy Still Suffers from Cybersecurity Complacency |
System State, System Problems, Scientific & Technology Responses |
Conflict & War, Cybersecurity & Sustainability |
2023 |
China’s Approach to Military 5G Networks and Related Military Applications |
System State, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Conflict & War, Cybersecurity & Sustainability |
2023 |
India and Cyber Power: The Imperative of Offensive Cyber Operations |
System State, Scientific & Technology Responses, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2022 |
Russia’s Wartime Cyber Operations in Ukraine: Military Impacts, Influences, and Implications |
System Problems, Scientific & Technology Responses, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Conflict & War, Cybersecurity & Sustainability |
2022 |
Ukraine gears up for new phase of cyber war with Russia |
System State, System Problems, Socio-economic & Political Responses |
Cyber-IR, Conflict & War, Cybersecurity & Sustainability |
2023 |
Towards the Development of a Rationalist Cyber Conflict Theory |
System State |
Conflict & War, Cybersecurity & Sustainability |
2021 |
Fitting the Artificial Intelligence Approach to Problems in DoD |
System State, Socio-economic & Political Responses |
Cyber-IR, Conflict & War, Cybersecurity & Sustainability |
2021 |
Cybersecurity in Switzerland |
System State, Socio-economic & Political Responses |
Conflict & War, Cybersecurity & Sustainability |
2020 |
In the Middle East, War Is Going Digital |
System State, System Problems, Scientific & Technology Responses |
Cyber-IR, Conflict & War, Cybersecurity & Sustainability |
2021 |
Chapter Title: Case II: Dynamic, Decentralized, and Multilayered Internet Censorship (Book Title: Disruptions as Opportunities) |
System State, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Security and Privacy Concerns of the "Internet of Things" (IoT) in IT and its Help in the Various Sectors across the World |
Scientific & Technology Responses, Socio-economic & Political Responses |
Cybersecurity & Sustainability |
2020 |
How to hack the hackers: The human side of cybercrime |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2016 |
Moving the Encryption Policy Conversation Forward |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2019 |
Inside the Twisted Mind of the Security Professional |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2008 |
How will the US counter cyber threats? Our experts mark up the National Cybersecurity Strategy |
System State, Scientific & Technology Responses, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Self-Efficacy-Based Game Design To Encourage Security Behavior Online |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2019 |
Users are not stupid: Six cyber security pitfalls overturned |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2022 |
The Side Channel Metric Cheat Sheet |
System Problems |
Cybersecurity & Sustainability |
2022 |
Silicon-correlated Simulation Methodology of EM Side-channel Leakage Analysis |
System Problems |
Cybersecurity & Sustainability |
2022 |
CDT Comments on Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) |
Socio-economic & Political Responses |
Cybersecurity & Sustainability |
2022 |
Mission-Centric Automated Cyber Red Teaming |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2018 |
AT&T data breach hits nine million customer accounts |
System Problems |
Cybersecurity & Sustainability |
2023 |
Zoll Medical Data Breach Impacts 1 Million Individuals |
System Problems |
Cybersecurity & Sustainability |
2023 |
Microsoft fixes Outlook zero-day used by Russian hackers since April 2022 |
System Problems |
Cybersecurity & Sustainability |
2023 |
LockBit Ransomware Claims Data Breach at SpaceX Contractor |
System Problems |
Cybersecurity & Sustainability |
2023 |
Lookalike Telegram and WhatsApp Websites Distributing Cryptocurrency Stealing Malware |
System Problems |
Cybersecurity & Sustainability |
|
China’s Cybersecurity Industry: A Market Analysis |
System Problems, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2022 |
Biden team unveils new anti-cyberattack strategy |
Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Cyberattacks are reshaping modern warfare. How can countries and companies protect themselves? |
System Problems, Scientific & Technology Responses |
Cybersecurity & Sustainability |
2022 |
S. 3600 (117th): Strengthening American Cybersecurity Act of 2022 |
Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2022 |
TikTok Has Your Data Even If You've Never Used the App: Report. |
Socio-economic & Political Responses |
Cybersecurity & Sustainability |
2023 |
Hacking Healthcare: With 385m Patient Records Exposed, Cybersecurity Experts Sound Alarm on Breach Surge. |
System Problems, Scientific & Technology Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2022 |
Lessons from Russia's Cyber-War in Ukraine |
System State, Scientific & Technology Responses, Socio-economic & Political Responses |
Governance & Institutions, Conflict & War, Cybersecurity & Sustainability |
2022 |
Chatgpt and More: What Ai Chatbots Mean for the Future of Cybersecurity |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2023 |
National Security Creep in Cross-Border Investments |
System State, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2022 |
The role of human insight in AI-based cybersecurity |
Socio-economic & Political Responses |
Cybersecurity & Sustainability |
2023 |
Inoculating the Masses: Evaluating Cybersecurity Awareness Training |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
|
Living Off the Land as a Defender: Detecting Attacks with Flexible Baselines |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
|
Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
|