Identifying Law Enforcement Needs for Conducting Criminal Investigations Involving Evidence on the Dark Web |
System Problems |
Governance & Institutions |
2019 |
Many Hands in the Cookie Jar Case: Studies in Response Options to Cyber Incidents Affecting U.S. Government Networks and Implications for Future Response |
System State, Socio-economic & Political Responses |
Cyber-IR, Conflict & War |
2022 |
Data Incoming: How to Close the Cyber Data Gap |
System Problems |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2022 |
RESTRICT Act explained: proposed TikTok ban is 'a PATRIOT Act for the digital age,' some lawmakers say |
System State, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
|
Why Mexican Cyber-Cartels Threaten U.S. National Security |
System State, System Problems, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Cybersecurity & Sustainability |
2021 |
Artificial Intelligence and Autonomy in the Military: An Overview of NATO Member States’ Strategies and Deployment |
System State, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions, Conflict & War |
2022 |
Convention on Cybercrime |
Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2001 |
Towards the Development of a Rationalist Cyber Conflict Theory |
System State |
Conflict & War, Cybersecurity & Sustainability |
2021 |
Fitting the Artificial Intelligence Approach to Problems in DoD |
System State, Socio-economic & Political Responses |
Cyber-IR, Conflict & War, Cybersecurity & Sustainability |
2021 |
How to hack the hackers: The human side of cybercrime |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2016 |
Moving the Encryption Policy Conversation Forward |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2019 |
Inside the Twisted Mind of the Security Professional |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2008 |
How will the US counter cyber threats? Our experts mark up the National Cybersecurity Strategy |
System State, Scientific & Technology Responses, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
United States’ and China’s Cybersecurity Policies: Collaboration or Confrontation? |
System Problems, Socio-economic & Political Responses |
Cyber-IR, Governance & Institutions |
2021 |
FACT SHEET: Biden-Harris Administration Announces National Cybersecurity Strategy |
System State |
Cyber-IR, Governance & Institutions |
2023 |
Presidential Policy Directive -- Critical Infrastructure Security and Resilience |
System State |
Governance & Institutions |
2013 |
CDT Comments on Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) |
Socio-economic & Political Responses |
Cybersecurity & Sustainability |
2022 |
The better angels of our digital nature? Offensive cyber capabilities and state violence |
Scientific & Technology Responses |
Cyber-IR, Conflict & War |
2021 |
Ethics of AI and Cybersecurity When Sovereignty is at Stake |
System State, Scientific & Technology Responses |
Cyber-IR, Governance & Institutions, Conflict & War |
2019 |
Mission-Centric Automated Cyber Red Teaming |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2018 |
What Would Really Happen If Russia Attacked Undersea Internet Cables |
Scientific & Technology Responses |
Conflict & War |
2018 |
AT&T data breach hits nine million customer accounts |
System Problems |
Cybersecurity & Sustainability |
2023 |
Zoll Medical Data Breach Impacts 1 Million Individuals |
System Problems |
Cybersecurity & Sustainability |
2023 |
LockBit Ransomware Claims Data Breach at SpaceX Contractor |
System Problems |
Cybersecurity & Sustainability |
2023 |
Biden team unveils new anti-cyberattack strategy |
Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Advancing Zero Trust Maturity Throughout the User Pillar |
System State |
Cyber-IR |
2023 |
S. 3600 (117th): Strengthening American Cybersecurity Act of 2022 |
Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2022 |
2020 Thematic Brief: US Cybersecurity Efforts |
System State |
Cyber-IR |
2020 |
TikTok Has Your Data Even If You've Never Used the App: Report. |
Socio-economic & Political Responses |
Cybersecurity & Sustainability |
2023 |
Hacking Healthcare: With 385m Patient Records Exposed, Cybersecurity Experts Sound Alarm on Breach Surge. |
System Problems, Scientific & Technology Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2022 |
National Security Creep in Cross-Border Investments |
System State, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2022 |
The Year of Section 702 Reform, Part I: Backdoor Searches |
System State, Socio-economic & Political Responses |
Governance & Institutions |
2023 |
Developments in Privacy and Data Ownership in Mobile Health Technologies, 2016-2019 |
System Problems |
Governance & Institutions |
2020 |
How cyber-attacks in Ukraine show the vulnerability of the U.S. power grid |
System State |
Conflict & War |
2017 |
Inoculating the Masses: Evaluating Cybersecurity Awareness Training |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
|
Living Off the Land as a Defender: Detecting Attacks with Flexible Baselines |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
|
Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
|
EXECUTIVE ORDER 14028, IMPROVING THE NATION'S CYBERSECURITY |
Socio-economic & Political Responses |
Governance & Institutions |
2021 |
The Cyber-ASAT: On the Impact of Cyber Weapons in Outer Space |
Scientific & Technology Responses |
Conflict & War |
2019 |
Entering Year Four, Space Force Focusing on Cyber Capabilities |
Socio-economic & Political Responses |
Conflict & War |
2022 |
"Spike in destructive attacks, ransomware boosts banks’ cybersecurity spending in 2022" |
System Problems |
Cybersecurity & Sustainability |
2022 |
Software Application Profile: Opal and Mica: open-source software solutions for epidemiological data management, harmonization and dissemination |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2017 |
Where Does Cyber Security Stop And Data Protection Start? |
System State |
Governance & Institutions |
2022 |
The US military wants to understand the most important software on Earth |
System State, Scientific & Technology Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2022 |
Protecting Our Future: Partnering to Safeguard K-12 Organizations from Cybersecurity Threats |
System Problems, Socio-economic & Political Responses |
Cybersecurity & Sustainability |
2023 |
More Cybersecurity Cooperation between Singapore, US in Public, Defence and Financial Sectors |
System State |
Cyber-IR, Governance & Institutions |
2022 |
Cybersecurity under the Ocean |
System State, Socio-economic & Political Responses |
Governance & Institutions, Cybersecurity & Sustainability |
2023 |
Assessing Severity of Cyber-Attack Threats Against Cyber-Manufacturing Systems |
Scientific & Technology Responses |
Cybersecurity & Sustainability |
2022 |
NICSim: Nuclear Instrumentation & Control Simulation for Evaluation Response to Cyber-attacks |
Scientific & Technology Responses |
Cyber-IR, Cybersecurity & Sustainability |
2020 |
Cyber Events Database |
Scientific & Technology Responses |
Cyber-IR, Governance & Institutions |
2014 |