Corporate Cybersecurity Is Becoming Geopolitical. Are U.S. Tech Companies Ready? |
Social Solutions, International Responses |
Industry |
2019 |
A New Old Threat: Countering the Return of Chinese Industrial Cyber Espionage |
International Responses |
Conflicts, Governance |
2019 |
How Chinese Spies Got the N.S.A’s Hacking Tools, and Used Them for Attacks |
Technical Solutions |
Industry |
2019 |
Explained: US, China's undersea battle for control of global internet grid |
Technical Solutions |
Industry |
2019 |
Best Practices for Operating Government-Industry Partnerships in Cyber Security |
Technical Solutions, Social Solutions |
Governance, Industry |
2019 |
The year ahead in cybersecurity law |
Problems, Social Solutions, International Responses |
Industry |
2019 |
The new oil. A practical approach to the physics, economics and engineering which enabled our rise and are now shaping the battle to escape our demise. |
Problems |
Energy |
2019 |
Norsk Hydro Hit with ‘Severe’ LockerGoga Ransomware Attack |
Technical Solutions |
Industry |
2019 |
Dark web crime markets targeted by recurring DDoS attacks |
Technical Solutions |
Industry |
2019 |
Will the United States Finally Enact a Federal Comprehensive Privacy Law? |
Social Solutions |
Industry |
2019 |
Internet of Things for Sustainability: Perspectives in Privacy, Cybersecurity, and Future Trends |
Technical Solutions, Social Solutions |
Consumption, Industry |
2019 |
Why Information Security is Hard – An Economic Perspective |
Social Solutions |
Industry |
2019 |
Social engineering in cybersecurity: The evolution of a concept |
Social Solutions |
Governance |
2018 |
100 Resilient Cities |
Activities, Problems, Social Solutions |
Governance, Population, Urbanization |
2018 |
The US Leans on Private Firms to Expose Foreign Hackers |
Social Solutions, International Responses |
Industry |
2018 |
Increasing International Cooperation in Cybersecurity and Adapting Cyber Norms |
Social Solutions, International Responses |
Conflicts, Governance |
2018 |
How Will Artificial Intelligence And Machine Learning Impact Cyber Security?” |
Technical Solutions |
Industry |
2018 |
The Benefits of Cap and Trade |
Social Solutions |
Energy, Trade |
2018 |
The Living Planet Report |
Problems, Technical Solutions |
Consumption, Energy, Industry, Mobility |
2018 |
The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies |
Activities, Problems, Technical Solutions, Social Solutions, International Responses |
Industry |
2018 |
A problem shared is a problem halved:
A survey on the dimensions of collective cyber defense through security information sharing |
Activities, Technical Solutions |
Governance, Industry |
2018 |
A New, More Aggressive U.S. Cybersecurity Policy Complements Traditional Methods |
Social Solutions |
Industry |
2018 |
Machine Learning in Cybersecurity |
Technical Solutions |
Industry |
2018 |
The Private Sector: A Reluctant Partner in Cybersecurity |
Activities, Social Solutions |
Governance |
2018 |
Reflections on The Fog of (Cyber) War |
Social Solutions |
Governance |
2018 |
Artificial Intelligence Is a Threat to Cybersecurity. It’s Also a Solution. |
Technical Solutions, Social Solutions |
Industry |
2018 |
The Role of NGOs in Sustainable Development |
Social Solutions |
Governance |
2018 |
Most State Election Officials Lack Necessary Clearances, DHS Says |
Social Solutions, International Responses |
Conflicts, Governance |
2018 |
The Future of Power |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2018 |
Criminals, Not State Actors, Target Russian Oil Company in 3-Year Cyber Attack |
International Responses |
Conflicts |
2018 |
Safe Guarding Internet of Thing Using Cyber Security Awareness Strategy |
Technical Solutions, Social Solutions, International Responses |
Governance |
2018 |
What makes cybercrime laws so difficult to enforce. |
Technical Solutions |
Industry |
2018 |
“Public-private partnerships in national cyber-security strategies” |
Activities, Technical Solutions |
Governance, Industry |
2018 |
In Cyberwar, There are no rules: Why the world desperately needs digital Geneva Conventions. |
International Responses |
Conflicts, Governance |
2018 |
Battlefield Internet: A Plan for Securing Cyberspace |
Social Solutions |
Industry |
2018 |
City Prosperity Index |
Problems |
Urbanization |
2018 |
A survey on technical threat intelligence in the age of sophisticated cyber attacks |
Problems, Technical Solutions |
Industry |
2018 |
A Cyberattack in Saudi Arabia Had a Deadly Goal. Experts Fear Another Try. |
Activities, International Responses |
Industry |
2018 |
LEARNING TO PROTECT COMMUNICATIONS WITH ADVERSARIAL NEURAL CRYPTOGRAPHY |
Technical Solutions |
Industry |
2018 |
March 2018 Cyber Attacks Statistics |
Activities |
Conflicts |
2018 |
Cyber risk from a chief risk officer perspective |
Technical Solutions |
Governance, Industry, Trade |
2018 |
A Digital Geneva Convention?: The Role of the Private Sector in Cybersecurity |
Social Solutions, International Responses |
Conflicts, Governance |
2018 |
I’m harvesting credit card numbers and passwords from your site. Here’s how. |
Activities, Social Solutions |
Trade |
2018 |
A Chinese Perspective on the Pentagon’s Cyber Strategy: From ‘Active Cyber Defense’ to ‘Defending Forward' |
Activities, Social Solutions, International Responses |
Conflicts, Governance |
2018 |
Artificial Intelligence Safety and Cybersecurity: a Timeline of AI Failures |
Technical Solutions |
Industry |
2018 |
“Public-private partnerships in national cyber-security strategies” |
Activities, Technical Solutions |
Governance, Industry |
2018 |
TOWARDS A SUSTAINABLE URBAN FUTURE IN OMAN:PROBLEM & PROCESS ANALYSIS (MUSCAT AS A CASE STUDY) |
Problems |
Urbanization |
2018 |
Cyber Warfare and Sino-American Crisis Instability |
Activities |
Conflicts |
2018 |
Local Governments for Sustainability |
Problems, Social Solutions |
Governance, Urbanization |
2018 |
Sustainable Development Goals (SDGs): Egypt 2030 |
Social Solutions |
Energy, Governance, Population |
2018 |