Phishing emails are the single most significant attack vector facing consumers and businesses today. Companies routinely report on metrics that do not adequately define their …
This guide aims to be a valuable place for in-house counsel to go to help them understand and address cybersecurity concerns. In-house counsel does not …
This Critical Challenge Project is focused on Cybersecurity and Boards of Directors. It highlights six lenses of research: Wall Street Journal CyberPro Research, Proxy Statement …
This paper explores the questions about whether we can trust security ratings and how we should use them. My approaches are, (1) describing traditional and …
Technology brought incredible convenience to nearly every aspect of our lives. Means of communication, transportation, entertainment, and even exercise is very different. Innovation came with, …
Cybersecurity data is robust and prevalent. However, that data rarely correlates with vulnerabilities, security controls, and threats for a target environment. As cyber-related threats continue …
To remain both competitive and compliant, organizations need consistent approaches for how to understand and consume data, what to collect, and how to manage it. …
Cybersecurity planning remains the purview of a few high-cost experts, but urgently needs to be available to the many non-expert managers of small-to-medium businesses (SMBs) …
The rapid adoption of the cloud is resulting in an increasing insider threat attack surface, as cloud service providers and the supply chain must now …
The purpose of this research paper is to explore the impact of Artificial Intelligence on cybersecurity, specifically the defensive aspects of cybersecurity. This paper is …
This paper seeks to explore the challenges and the impact of a fragmented vendor risk assessment process across the financial industry. This is an important …
This paper explores several use cases where human microchipping is enabling humans and businesses to interact with their digital surroundings faster and more efficiently in …
Cybersecurity involves an “all-hands on deck” approach from multiple stakeholders at every institution. In order to successfully implement this approach, organizations must adjust their cultures …
Each of the states are working towards improving their cyber incident responses but are not collaborating as much as needed. There are many efforts that …
An educational animated video developed to augment the DoD cybersecurity training programs, sensitize DoD members to current cybersecurity threats, and improve the overall cybersecurity posture …
An educational animated video developed to augment the DoD cybersecurity training programs, sensitize DoD members to current cybersecurity threats, and improve the overall cybersecurity posture …
The human factor is a crucial element for cybersecurity. One of the ways the cyber attackers are successfully exploiting our systems is by manipulating innocent …
An educational animated video developed to augment the DoD cybersecurity training programs, sensitize DoD members to current cybersecurity threats, and improve the overall cybersecurity posture …
The paper provides design and security considerations for Software-Defined Wide Area Network (SD-WAN) transformation from a traditional Multi-Protocol Label Switching (MPLS) WAN architecture. The rapid …
With the influx of online services offered at various levels of state government, citizen personal information is increasingly stored in various identity repositories associated with …
As the information security discipline continues to mature, we can draw on some of the lessons learned by the software development community. The dawn of …
It's time to think seriously about creating legal definitions that would classify certain types of code as digital weapons. Our current regulation is weak and …
The paper is an examination of policy and technical solutions for the problem of maintaining the security of consumer devices and applications while providing mechanisms …
Traditionally, paper ballots have been used in elections in the United States. This project explores the security challenges associated with the deployment and use of …