Filter & Sort
| Date | Type | Research Item | Topics |
|---|---|---|---|
|
October 30, 2025 |
White Paper |
Securing Mutual Aid: Cybersecurity Practices and Design Principles for Financial TechnologyBy: Elijah Baucom, Anna Lanzino, Yvette Vargas, Nicholas Perematko Mutual aid organizations, such as food banks, disaster relief, direct cash assistance, and bail funds, serve as critical community pillars, yet their efforts are increasingly under threat in… |
civil cyber defensecyber civil defensedigital harmsgovernanceinfrastructuremultifactor authenticationpasswordspublic interest cybersecurityusable security |
|
October 1, 2025 |
White Paper |
Enhancing Cyber Resilience for Equitable Healthcare: Analysis of Cyberattacks Targeting Sexual and Reproductive Facilities and ServicesBy: Pavlina Pavlova Healthcare is among the most targeted and vulnerable sectors for cyberattacks. Sexual and reproductive health (SRH) facilities and services in particular face financially motivated ransomware attacks and data… |
civil cyber defensecyber civil defensedigital harmsgovernancehealthcarehospitalshuman rightsmisinformationmultifactor authenticationpublic interest cybersecurityusable security |
|
September 19, 2025 |
White Paper |
Building Trust: Quantifying Use of the .gov Domain Below the Federal LevelBy: Chris Babcock Trust in digital government services relies on users’ ability to verify that websites and emails genuinely represent official institutions. The .gov top-level domain (TLD), managed by the Cybersecurity… |
civil cyber defensecyber civil defensedigital harmselectionsgovernanceNISTpolicypublic interest cybersecurity |
|
August 6, 2025 |
White Paper |
A Path to Long-Term Cyber Resilience for Under-Resourced OrganizationsBy: Michael Razeeq Across the United States, state, local, tribal, and territorial governments (“SLTTs”), small- and medium-sized businesses (“SMBs”), and nonprofits are frequently targeted in cyber attacks, leading to significant financial… |
cyber civil defensedigital harmsgovernanceinfrastructurenational securitypublic interest cybersecuritywater |
|
August 4, 2025 |
White Paper |
Economics of Cyber Policies for Critical CareBy: Aden Klein Cyberattacks are a pressing threat to hospital operations, patient health data, and, most importantly, patient lives. Cybersecurity insurance has become a key component of resilience for the… |
cyber civil defensedigital harmshealthcarehospitalsinfrastructureinsurancepolicy |
|
June 17, 2025 |
White Paper |
The Roadmap to Community Cyber Defense: A Path Forward from the Cyber Resilience CorpsBy: Sarah Powazek, Grace Menna Community organizations — including nonprofits, hospitals, schools, local utilities, city governments, and small businesses — deliver vital services to the public, but they are often the least prepared to… |
|
|
May 8, 2025 |
White Paper |
Survey of Search Engine Safeguards and their Applicability for AIBy: Evan R. Murphy, Nada Madkour, Deepika Raman, Krystal Jackson, Jessica Newman, Survey of Search Engine Safeguards and their Applicability for AI A new research paper from the Center for Long-Term Cybersecurity examines how safeguards designed for search engines could be adopted by developers of AI systems like ChatGPT. The… |
artificial intelligence (AI)data sharingdigital harmsengineeringhomeland securitymachine learning (ML)misinformationnational security |
|
April 16, 2025 |
White Paper |
The South Korean Digital Paradox: How South Korea’s Internet Development Model Creates Unique Cybersecurity VulnerabilitiesBy: Nick Merrill, The South Korean Digital Paradox: How South Korea’s Internet Development Model Creates Unique Cybersecurity Vulnerabilities South Korea is home to one of the world’s most robust digital infrastructures, largely as a result of a government-led development model that has favored domestic technologies. Nearly… |
governanceinfrastructureinternet fragmentationmisinformationpolicyriskscenarios |
|
March 31, 2025 |
White Paper |
Managing Commercial Spyware Through Export Controls: Lessons Learned from the Wassenaar ExperienceBy: Elaine Korzak A new white paper from the Center for Long-Term Cybersecurity explores the use of international export controls to limit the dissemination of commercial spyware technologies. The paper, “Managing… |
digital harmsgovernancelaw enforcementnational securitypolicyprivacysurveillance |
|
February 3, 2025 |
White Paper |
Intolerable Risk Threshold Recommendations for Artificial IntelligenceBy: Deepika Raman, Nada Madkour, Evan R. Murphy, Krystal Jackson, Jessica Newman January has already seen the release of new frontier models that are creating waves with unprecedented innovation in their development and uplift in their capabilities. Simultaneously, we are… |
