Surveillance Self-Defense |
Activities |
Governance |
2018 |
'Cyber Disruption' Affected Parts Of U.S. Energy Grid |
Activities |
Industry |
2019 |
Facebook Data Breach Suggests the Public Sees Cybersecurity as Obsolete |
Technical Solutions |
Industry |
2019 |
How Chinese Spies Got the N.S.A’s Hacking Tools, and Used Them for Attacks |
Technical Solutions |
Industry |
2019 |
Researchers Warn Open Sky Drone Policy Poses Cybercriminal Risk |
Social Solutions |
Industry |
2019 |
Insurers Creating a Consumer Ratings Service for Cybersecurity Industry |
Technical Solutions, Social Solutions |
Industry, Trade |
2019 |
NATO's Role in Cyberspace |
International Responses |
Industry |
2019 |
The year ahead in cybersecurity law |
Problems, Social Solutions, International Responses |
Industry |
2019 |
Cybersecurity is Putting Customer Trust at the Center of Competition |
Social Solutions |
Industry |
2019 |
CISA wants more funding for critical infrastructure activities |
Social Solutions |
Industry |
2019 |
A Top Dark Web Drug Ring Goes Down—Thanks to ATM Withdrawals |
Activities |
Industry |
2019 |
U.S. Cyber Command operation disrupted Internet access of Russian troll factory on day of 2018 midterms |
Technical Solutions, International Responses |
Governance |
2019 |
Triton is the world’s most murderous malware, and it’s spreading |
Activities, Technical Solutions |
Industry |
2019 |
Why cybersecurity is the new priority for CFOs |
Social Solutions |
Governance |
2019 |
Corporate Cybersecurity Is Becoming Geopolitical. Are U.S. Tech Companies Ready? |
Social Solutions, International Responses |
Industry |
2019 |
An Assessment of North Korean Cyber Threats |
Social Solutions |
Conflicts, Governance |
2019 |
Getting Familiar with Cybersecurity Laws: Four Regulations You Should Know |
Social Solutions |
Industry |
2019 |
Our sustainability |
Activities |
Industry |
2019 |
Global Consequences of Escalating U.S.-Russia Cyber Conflict |
International Responses |
Industry |
2019 |
The Web of Profit: A look at the cybercrime economy |
Problems, Social Solutions |
Industry |
2019 |
The profile of the international cyber offender in the U.S. |
International Responses |
Industry |
2019 |
Going Toe-to-Toe With Ukraine’s Separatist Hackers |
Technical Solutions, Social Solutions, International Responses |
Industry |
2019 |
China, Russia Biggest Cyber Offenders |
International Responses |
Industry |
2019 |
A New Old Threat: Countering the Return of Chinese Industrial Cyber Espionage |
International Responses |
Conflicts, Governance |
2019 |
Explained: US, China's undersea battle for control of global internet grid |
Technical Solutions |
Industry |
2019 |
Enterprises need to embrace top-down cybersecurity management |
Problems, Social Solutions |
Governance |
2019 |
Best Practices for Operating Government-Industry Partnerships in Cyber Security |
Technical Solutions, Social Solutions |
Governance, Industry |
2019 |
Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes |
Activities |
Industry |
2019 |
What Israel's Strike on Hamas Hackers Means For Cyberwar |
Social Solutions, International Responses |
Industry |
2019 |
Three Chinese Digital Economy Policies at Stake in the U.S.–China Talks |
Social Solutions |
Industry |
2019 |
Why Information Security is Hard – An Economic Perspective |
Social Solutions |
Industry |
2019 |
The cyber-resilience of financial institutions: significance and applicability |
Social Solutions |
Trade |
2019 |
Trump’s cyber workforce order gets bipartisan praise |
Technical Solutions, International Responses |
Governance |
2019 |
How far should organizations be able to go to defend against cyberattacks? |
Activities, Technical Solutions |
Industry |
2019 |
France’s New Offensive Cyber Doctrine |
Activities, Social Solutions, International Responses |
Conflicts, Governance, Industry |
2019 |
Understanding China’s AI Strategy: Clues to Chinese Strategic Thinking on Artificial Intelligence and National Security |
Technical Solutions, International Responses |
Industry |
2019 |
Thailand's Cyber Law Raises Fear Military Could ‘Cage’ the Internet |
Social Solutions |
Industry |
2019 |
Cyber Security Meets Security Politics: Complex Technology, Fragmented Politics, and Networked Science |
Technical Solutions, Social Solutions |
Conflicts, Governance, Industry |
2019 |
These Are the Worst Corporate Hacks of All Time |
Activities, International Responses |
Industry |
2019 |
The 2016 U.S. Election: Can Democracy Survive the Internet? |
Social Solutions |
Governance |
2019 |
Creating a Culture of Enterprise Cybersecurity |
Social Solutions |
Industry |
2019 |
A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments |
International Responses |
Industry |
2019 |
Can artificial intelligence spot spam quicker than humans? |
Technical Solutions |
Industry |
2019 |
Will the United States Finally Enact a Federal Comprehensive Privacy Law? |
Social Solutions |
Industry |
2019 |
On the Effectiveness of Machine and Deep Learning for Cyber Security |
Technical Solutions |
Industry |
2019 |
Development of a Tool for Culinary Management |
Problems |
Consumption |
2019 |
AI Policy – United States |
Technical Solutions |
Governance |
2019 |
VII. Application of California Environmental Quality Act |
Social Solutions |
Energy |
2019 |
An ‘Increase in Clarity’ in US Cyber Strategy |
International Responses |
Industry |
2019 |
Hackers TRICKED a Tesla: The Race to Fooling Artificial Intelligence |
Technical Solutions, Social Solutions |
Industry |
2019 |