Research Library

Since 2015, CLTC has directly funded more than 160 projects by UC Berkeley students, faculty & affiliates on original cybersecurity research topics, in addition to developing our own white papers, publications, blogs, policy analysis and recommendations, and open-source curricula and toolkits.

Filter & Sort

Sort by
Research Type
Research Topics
Date Type Research Item Topics

December 8, 2025

Blog Post

Image representing digital technology, internet network connection, futuristic innovation

From Automation to Autonomy: The Next Leap in AI-Enabled Cybercrimes

By: Gil Baram, Helena Yixin Huang, Derek Manky

In a blog post, Baram, Manky, and Huang share some of the key takeaways from a tabletop exercise conducted in Singapore focused on AI-enabled cybercrime.

artificial intelligence (AI)

November 4, 2025

Blog Post

a hand rolling dice

AI Risk is Investment Risk

By: Oumou Ly

Investors, shareholders, and corporate boards who engage in AI oversight will gain earlier visibility into systemic exposures, sharpen their ability to price emerging risks, and set the standards…

October 30, 2025

White Paper

multi-colored hands made out of paper forming a heart

Securing Mutual Aid: Cybersecurity Practices and Design Principles for Financial Technology

By: Elijah Baucom, Anna Lanzino, Yvette Vargas, Nicholas Perematko

Mutual aid organizations, such as food banks, disaster relief, direct cash assistance, and bail funds, serve as critical community pillars, yet their efforts are increasingly under threat in…

cyber civil defensedigital harmsgovernanceinfrastructuremultifactor authenticationpasswordspublic interest cybersecurityusable security

October 1, 2025

White Paper

the hands of a doctor and a woman across the table in a medical clinic

Enhancing Cyber Resilience for Equitable Healthcare: Analysis of Cyberattacks Targeting Sexual and Reproductive Facilities and Services

By: Pavlina Pavlova

Healthcare is among the most targeted and vulnerable sectors for cyberattacks. Sexual and reproductive health (SRH) facilities and services in particular face financially motivated ransomware attacks and data…

cyber civil defensedigital harmsgovernancehealthcarehospitalshuman rightsmisinformationmultifactor authenticationpublic interest cybersecurityusable security

September 19, 2025

White Paper

.gov in digital print in front of a government state house

Building Trust: Quantifying Use of the .gov Domain Below the Federal Level

By: Chris Babcock

Trust in digital government services relies on users’ ability to verify that websites and emails genuinely represent official institutions. The .gov top-level domain (TLD), managed by the Cybersecurity…

cyber civil defensedigital harmselectionsgovernanceNISTpolicypublic interest cybersecurity

August 6, 2025

White Paper

A Path to Long-Term Cyber Resilience for Under-Resourced Organizations

By: Michael Razeeq

Across the United States, state, local, tribal, and territorial governments (“SLTTs”), small- and medium-sized businesses (“SMBs”), and nonprofits are frequently targeted in cyber attacks, leading to significant financial…

cyber civil defensedigital harmsgovernanceinfrastructurenational securitypublic interest cybersecuritywater

August 4, 2025

White Paper

man in a hospital using digital equipment

Economics of Cyber Policies for Critical Care

By: Aden Klein

  Cyberattacks are a pressing threat to hospital operations, patient health data, and, most importantly, patient lives. Cybersecurity insurance has become a key component of resilience for the…

cyber civil defensedigital harmshealthcarehospitalsinfrastructureinsurancepolicy

June 17, 2025

White Paper

a curving line suggesting a roadmap

The Roadmap to Community Cyber Defense: A Path Forward from the Cyber Resilience Corps

By: Sarah Powazek, Grace Menna

Community organizations — including nonprofits, hospitals, schools, local utilities, city governments, and small businesses — deliver vital services to the public, but they are often the least prepared to…

public interest cybersecurity

May 13, 2025

Blog Post

Reflections on Cybersecurity Futures 2025: Looking Back from the Present

By: Nick Merrill, Steven Weber

In this article, Nick Merrill and Steve Weber conduct a “postmortem” analysis of the Cybersecurity Futures 2025 scenarios, which were written in 2020. The authors look at what they got right — and wrong — and what it means for our understanding of changes and trends in technology and digital security.

artificial intelligence (AI)data economydeep fakedigital harmsglobalizationgovernanceinfrastructureinternet fragmentationmisinformationprivacyquantumscenariossurveillancesynthetic media (deepfakes)

May 12, 2025

Blog Post

Slashing EPA funding may have downstream cybersecurity impacts on an already vulnerable water sector

By: Shannon Pierson

America’s water and wastewater utilities rely on the Environmental Protection Agency for cybersecurity support and guidance. With the EPA’s funding on the Trump Administration’s chopping block, America’s water…

digital harmshomeland securityinfrastructurenational securitypublic interest cybersecurity