Research Library

Since 2015, CLTC has directly funded more than 160 projects by UC Berkeley students, faculty & affiliates on original cybersecurity research topics, in addition to developing our own white papers, publications, blogs, policy analysis and recommendations, and open-source curricula and toolkits.

Filter & Sort

Sort by
Research Type
Research Topics
Date Type Research Item Topics

May 5, 2026

White Paper

a tree-like structure with the branches connecting colored blocks with chess pawn figures - suggesting a connected network.

Save Money, Build Talent, and Defend Communities: A Whole-of-State Cybersecurity Guidebook

By: Grace Menna

A new guidebook released by CLTC’s Public Interest Cybersecurity Program highlights the benefits of “community cyber defense programs” — including cybersecurity clinics, regional security operation centers (RSOCs), and state cyber corps — as a resource for defending organizations like nonprofits, rural hospitals, schools, local utilities, counties, municipalities, and small businesses from cyber attacks.

cyber civil defensegovernancehomeland securitynational securitypublic interest cybersecurity

April 23, 2026

White Paper

GPAI Profile V1.2 Cover Photo

General-Purpose AI Risk-Management Standards Profile

By: Nada Madkour, Jessica Newman, Deepika Raman, Krystal Jackson, Evan R. Murphy, Charlotte Yuan, Dan Hendrycks

A team of researchers affiliated with the Center for Long-Term Cybersecurity’s AI Security Initiative has published the second annual update to the General-Purpose AI Risk-Management Standards Profile (Version 1.2), a resource to help identify and mitigate the risks and potential harmful impacts of general-purpose AI (GPAI) models. 

artificial intelligence (AI)

April 17, 2026

White Paper

the seattle space needle and some red block images

CyberCAN Washington: A Regional Assessment of Nonprofit Cybersecurity and Strategic Recommendations for Washington State

By: Shannon Pierson, Sarah Powazek, Nicholas Perematko

A new report from CLTC’s Public Interest Cybersecurity Program examines the cyber threats facing nonprofits in Washington — and offers guidance for how the state government can support their digital defense.

AI securitycyber civil defensegovernancehospitalsinfrastructurepublic interest cybersecurityvulnerable populations

February 19, 2026

White Paper

Texas State Legislature

Tracking Cybersecurity Policy Developments Across State Legislatures: 2025 Enacted Legislation

By: Shannon Pierson, Sree Varsha Bhanoor

A new report from researchers at the Center for Long-Term Cybersecurity’s Public Interest Cybersecurity Program presents a first-of-its-kind empirical analysis of every cybersecurity-related bill enacted in all 50 states during the 2025 legislative sessions. The research identifies nationwide patterns in the cyber policy issues states addressed, the regulatory approaches they adopted, and the entities and sectors they chose to regulate.

ARCHIVEbug bountycyber civil defensegovernancehealthcarepolicypublic interest cybersecurity

February 11, 2026

White Paper

swirling white lines

Agentic AI Risk-Management Standards Profile

By: Nada Madkour, Jessica Newman, Deepika Raman, Krystal Jackson, Evan R. Murphy, Charlotte Yuan

A new paper authored by researchers from the Center for Long-Term Cybersecurity’s Artificial Intelligence Security Initiative (AISI) focuses on “AI agents” or “agentic AI,” AI systems that can autonomously pursue goals and take actions with little to no human oversight, often through interaction with external environments and tools.

ARCHIVEartificial intelligence (AI)digital harmsgovernancehuman rightsmisinformationNISTpolicyreinforcement learningrisksurveillance

January 22, 2026

White Paper

glowing digital dots appearing to come off of a surface

Toward Risk Thresholds for AI-Enabled Cyber Threats: Enhancing Decision-Making Under Uncertainty with Bayesian Networks

By: Krystal Jackson, Deepika Raman, Jessica Newman, Nada Madkour, Charlotte Yuan, Evan R. Murphy

Artificial intelligence (AI) is increasingly being used to augment and automate cyber operations, altering the scale, speed, and accessibility of malicious activity. For example, AI can be used…

ARCHIVEartificial intelligence (AI)cybercrimedigital harmsgovernancepolicyrisk

December 8, 2025

Blog Post

Image representing digital technology, internet network connection, futuristic innovation

From Automation to Autonomy: The Next Leap in AI-Enabled Cybercrimes

By: Gil Baram, Helena Yixin Huang, Derek Manky

In a blog post, Baram, Manky, and Huang share some of the key takeaways from a tabletop exercise conducted in Singapore focused on AI-enabled cybercrime.

artificial intelligence (AI)

November 4, 2025

Blog Post

a hand rolling dice

AI Risk is Investment Risk

By: Oumou Ly

Investors, shareholders, and corporate boards who engage in AI oversight will gain earlier visibility into systemic exposures, sharpen their ability to price emerging risks, and set the standards…

October 30, 2025

White Paper

multi-colored hands made out of paper forming a heart

Securing Mutual Aid: Cybersecurity Practices and Design Principles for Financial Technology

By: Elijah Baucom, Anna Lanzino, Yvette Vargas, Nicholas Perematko

Mutual aid organizations, such as food banks, disaster relief, direct cash assistance, and bail funds, serve as critical community pillars, yet their efforts are increasingly under threat in…

ARCHIVEcyber civil defensedigital harmsgovernanceinfrastructuremultifactor authenticationpasswordspublic interest cybersecurityusable security

October 1, 2025

White Paper

the hands of a doctor and a woman across the table in a medical clinic

Enhancing Cyber Resilience for Equitable Healthcare: Analysis of Cyberattacks Targeting Sexual and Reproductive Facilities and Services

By: Pavlina Pavlova

Healthcare is among the most targeted and vulnerable sectors for cyberattacks. Sexual and reproductive health (SRH) facilities and services in particular face financially motivated ransomware attacks and data…

ARCHIVEcyber civil defensedigital harmsgovernancehealthcarehospitalshuman rightsmisinformationmultifactor authenticationpublic interest cybersecurityusable security