Filter & Sort
Date | Type | Research Item | Topics |
---|---|---|---|
October 1, 2025 |
White Paper |
![]() Enhancing Cyber Resilience for Equitable Healthcare: Analysis of Cyberattacks Targeting Sexual and Reproductive Facilities and ServicesBy: Pavlina Pavlova Healthcare is among the most targeted and vulnerable sectors for cyberattacks. Sexual and reproductive health (SRH) facilities and services in particular face financially motivated ransomware attacks and data… |
civil cyber defensecyber civil defensedigital harmsgovernancehealthcarehospitalshuman rightsmisinformationmultifactor authenticationpublic interest cybersecurityusable security |
September 19, 2025 |
White Paper |
![]() Building Trust: Quantifying Use of the .gov Domain Below the Federal LevelBy: Chris Babcock Trust in digital government services relies on users’ ability to verify that websites and emails genuinely represent official institutions. The .gov top-level domain (TLD), managed by the Cybersecurity… |
civil cyber defensecyber civil defensedigital harmselectionsgovernanceNISTpolicypublic interest cybersecurity |
August 6, 2025 |
White Paper |
![]() A Path to Long-Term Cyber Resilience for Under-Resourced OrganizationsBy: Michael Razeeq Across the United States, state, local, tribal, and territorial governments (“SLTTs”), small- and medium-sized businesses (“SMBs”), and nonprofits are frequently targeted in cyber attacks, leading to significant financial… |
cyber civil defensedigital harmsgovernanceinfrastructurenational securitypublic interest cybersecuritywater |
August 4, 2025 |
White Paper |
![]() Economics of Cyber Policies for Critical CareBy: Aden Klein Cyberattacks are a pressing threat to hospital operations, patient health data, and, most importantly, patient lives. Cybersecurity insurance has become a key component of resilience for the… |
cyber civil defensedigital harmshealthcarehospitalsinfrastructureinsurancepolicy |
June 17, 2025 |
White Paper |
![]() The Roadmap to Community Cyber Defense: A Path Forward from the Cyber Resilience CorpsBy: Sarah Powazek, Grace Menna Community organizations — including nonprofits, hospitals, schools, local utilities, city governments, and small businesses — deliver vital services to the public, but they are often the least prepared to… |
|
May 13, 2025 |
Blog Post |
![]() Reflections on Cybersecurity Futures 2025: Looking Back from the PresentBy: Nick Merrill, Steven Weber In this article, Nick Merrill and Steve Weber conduct a “postmortem” analysis of the Cybersecurity Futures 2025 scenarios, which were written in 2020. The authors look at what they got right — and wrong — and what it means for our understanding of changes and trends in technology and digital security. |
artificial intelligence (AI)data economydeep fakedigital harmsglobalizationgovernanceinfrastructureinternet fragmentationmisinformationprivacyquantumscenariossurveillancesynthetic media (deepfakes) |
May 12, 2025 |
Blog Post |
![]() Slashing EPA funding may have downstream cybersecurity impacts on an already vulnerable water sectorBy: Shannon Pierson America’s water and wastewater utilities rely on the Environmental Protection Agency for cybersecurity support and guidance. With the EPA’s funding on the Trump Administration’s chopping block, America’s water… |
digital harmshomeland securityinfrastructurenational securitypublic interest cybersecurity |
May 8, 2025 |
White Paper |
![]() Survey of Search Engine Safeguards and their Applicability for AIBy: Evan R. Murphy, Nada Madkour, Deepika Raman, Krystal Jackson, Jessica Newman, Survey of Search Engine Safeguards and their Applicability for AI A new research paper from the Center for Long-Term Cybersecurity examines how safeguards designed for search engines could be adopted by developers of AI systems like ChatGPT. The… |
artificial intelligence (AI)data sharingdigital harmsengineeringhomeland securitymachine learning (ML)misinformationnational security |
April 16, 2025 |
White Paper |
![]() The South Korean Digital Paradox: How South Korea’s Internet Development Model Creates Unique Cybersecurity VulnerabilitiesBy: Nick Merrill, The South Korean Digital Paradox: How South Korea’s Internet Development Model Creates Unique Cybersecurity Vulnerabilities South Korea is home to one of the world’s most robust digital infrastructures, largely as a result of a government-led development model that has favored domestic technologies. Nearly… |
governanceinfrastructureinternet fragmentationmisinformationpolicyriskscenarios |
March 31, 2025 |
White Paper |
![]() Managing Commercial Spyware Through Export Controls: Lessons Learned from the Wassenaar ExperienceBy: Elaine Korzak A new white paper from the Center for Long-Term Cybersecurity explores the use of international export controls to limit the dissemination of commercial spyware technologies. The paper, “Managing… |
digital harmsgovernancelaw enforcementnational securitypolicyprivacysurveillance |