France’s New Offensive Cyber Doctrine |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2019 |
A public policy perspective of the Dark Web |
Social Solutions, International Responses |
Industry |
2016 |
The year ahead in cybersecurity law |
Problems, Social Solutions, International Responses |
Industry |
2019 |
China, Russia Biggest Cyber Offenders |
International Responses |
Industry |
2019 |
A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing |
Social Solutions, International Responses |
Governance |
2016 |
WHAT ISRAEL'S STRIKE ON HAMAS HACKERS MEANS FOR CYBERWAR |
Activities, International Responses |
Industry |
2019 |
These Are the Worst Corporate Hacks of All Time |
Activities, International Responses |
Industry |
2019 |
The US Leans on Private Firms to Expose Foreign Hackers |
Social Solutions, International Responses |
Industry |
2018 |
Corporate Cybersecurity Is Becoming Geopolitical. Are U.S. Tech Companies Ready? |
Social Solutions, International Responses |
Industry |
2019 |
Digital Diplomacy: In China, the Tech Industry Does What Washington Can't |
International Responses |
Industry |
2015 |
The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Industry |
2018 |
What Israel's Strike on Hamas Hackers Means For Cyberwar |
Social Solutions, International Responses |
Industry |
2019 |
Global Consequences of Escalating U.S.-Russia Cyber Conflict |
International Responses |
Industry |
2019 |
NATO's Role in Cyberspace |
International Responses |
Industry |
2019 |
Trump’s cyber workforce order gets bipartisan praise |
Technical Solutions, International Responses |
Governance |
2019 |
Going Toe-to-Toe With Ukraine’s Separatist Hackers |
Technical Solutions, Social Solutions, International Responses |
Industry |
2019 |
An ‘Increase in Clarity’ in US Cyber Strategy |
International Responses |
Industry |
2019 |
In Cyberwar, There are no rules: Why the world desperately needs digital Geneva Conventions. |
International Responses |
Conflicts, Governance |
2018 |
6 Problems with U.S Intel on Russia Attacks |
Activities, Social Solutions, International Responses |
Industry |
2017 |
Increasing International Cooperation in Cybersecurity and Adapting Cyber Norms |
Social Solutions, International Responses |
Industry |
2018 |
Criminals, Not State Actors, Target Russian Oil Company in 3-Year Cyber Attack |
International Responses |
Conflicts |
2018 |
A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments |
International Responses |
Industry |
2019 |
Deterring Cyberattacks: How to Reduce Vulnerability |
International Responses |
Industry |
2017 |
The profile of the international cyber offender in the U.S. |
International Responses |
Industry |
2019 |
Understanding China’s AI Strategy: Clues to Chinese Strategic Thinking on Artificial Intelligence and National Security |
Technical Solutions, International Responses |
Industry |
2019 |
A Cyberattack in Saudi Arabia Had a Deadly Goal. Experts Fear Another Try. |
Activities, International Responses |
Industry |
2018 |
Freedom on the Net 2018: The Rise of Digital Authoritarianism |
Activities, Social Solutions, International Responses |
Industry |
2018 |
A Chinese Perspective on the Pentagon’s Cyber Strategy: From ‘Active Cyber Defense’ to ‘Defending Forward' |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2018 |
Increasing International Cooperation in Cybersecurity and Adapting Cyber Norms |
Social Solutions, International Responses |
Conflicts, Governance |
2018 |
A New Old Threat: Countering the Return of Chinese Industrial Cyber Espionage |
International Responses |
Conflicts, Governance |
2019 |
U.S. Cyber Command operation disrupted Internet access of Russian troll factory on day of 2018 midterms |
Technical Solutions, International Responses |
Governance |
2019 |
Takeaways From the Latest Russian Hacking Indictment |
Social Solutions, International Responses |
Governance |
2018 |
The SDG Academy (education) |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Energy, Land Use, Governance, Population, Urbanization, Water |
2018 |
Sustainable Development Goals of Zimbabwe |
Activities, Problems, Social Solutions, International Responses |
Agriculture, Governance, Population, Unmet Needs, Urbanization |
2018 |
The European Commission’s Proposed Data Protection Regulation: A Copernican Revolution in European Data Protection Law |
International Responses |
Governance |
2012 |
The concept of the information-security culture |
Social Solutions, International Responses |
Governance |
2013 |
The Five Futures of Cyber Conflict |
Social Solutions, International Responses |
Conflicts, Governance |
2011 |
Public international law of the international telecommunication instruments: cyber security treaty provisions since 1850 |
International Responses |
Conflicts, Governance |
2018 |
Taiwan Heist: Lazarus Tools and Ransomware |
Technical Solutions, Social Solutions, International Responses |
Governance, Industry |
2018 |
Public-private partnerships on cyber security: a practice of loyalty |
Social Solutions, International Responses |
Governance |
2017 |
The Constitution in the National Surveillance State |
Social Solutions, International Responses |
Conflicts, Governance |
2008 |
The Future of Power |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2018 |
Constructing Norms for Global Cybersecurity |
Social Solutions, International Responses |
Governance |
2016 |
Thermonuclear cyberwar |
Activities, Technical Solutions, International Responses |
Conflicts, Governance, Industry |
2018 |
Impediments with Policy Interventions to Foster Cybersecurity |
Social Solutions, International Responses |
Conflicts, Governance |
---- |
Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors |
Social Solutions, International Responses |
Conflicts, Governance |
2018 |
Most State Election Officials Lack Necessary Clearances, DHS Says |
Social Solutions, International Responses |
Conflicts, Governance |
2018 |
The Wrong War: The Insistence on Applying Cold War Metaphors to Cybersecurity Is Misplaced and Counterproductive |
Social Solutions, International Responses |
Conflicts, Governance |
2011 |
Global Internet Governance in Chinese Academic Literature: Rebalancing a Hegemonic World Order? |
Social Solutions, International Responses |
Governance |
2016 |
Deterrence in the Cyber Age |
International Responses |
Conflicts, Governance |
2014 |