Cyber Industrial Policy in an Era of Strategic Competition

May 22, 2019

Cybersecurity has become a central political and economic challenge for governments and businesses around the world. But while election hacking, malware, and cyber warfare have dominated the public discourse, the academic and policy communities have largely ignored the diverse industrial policies that governments can use to bolster their domestic cybersecurity and technology industries.

Spotlight

ROMAD Cyber Systems

ROMAD - RObust MAlware Detector, a name and brand that truly capture the essence of our uniquely innovative approach to sustainable and reliable malware detection. Our patented threat detection methodology enables our products to identify, analyze, and develop detection profiles for entire viral families, as opposed to specific strains or individual variants. We detect what OTHERS MISS – because we’re not stuck in the perpetual arms race with malware developers, passively looking for their next creation just to figure out how to catch it next time.

OTHER WHITEPAPERS
news image

The Cyber Resilience Index: Advancing Organizational Cyber Resilience

whitePaper | June 28, 2022

The World Economic Forum Centre for Cybersecurity – in collaboration with the Cyber Resilience Index working group and in partnership with Accenture – developed the global Cyber Resilience Index (CRI). The CRI provides public- and private-sector cyber leaders with a common framework of best practice for true cyber resilience, a mechanism to measure organizational performance, and clear language to communicate value.

Read More
news image

Cybersecurity Considerations in Autonomous Ships

whitePaper | October 18, 2022

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is a NATO-accredited knowledge hub offering a unique interdisciplinary approach to the most relevant issues in cyber defence.

Read More
news image

CloudVision as-a-Service: Security and Data Protection

whitePaper | January 24, 2023

Cloud-based software delivery has increasingly become the norm in today’s world, owing to the elasticity, scalability, and economy of cloud architectures. Arista has established a leadership position in the delivery of reliable and secure cloud networking and services management through the introduction of CloudVision®, a single unified AI/ML-enabled network management platform supporting every place in the cloud – and CloudVision is now available in an “as-aService” delivery model in the cloud.

Read More
news image

Threat Connect Cyber Survey Report

whitePaper | January 4, 2022

Whether you are in financial services, farming, or public infrastructure, the security threat to organizations has never been greater. Today, almost every company is a technology company in some shape or form and this can be a soft underbelly - open to attack. Cyber risk is the fastest-growing risk faced by businesses globally. A wide range of statistics and sources make it clear that attackers have become even more proficient over recent years, using automation to exploit vulnerabilities at an accelerated pace and frequency. Threats are even more widespread and complex than before.

Read More
news image

API Security: Best Practices for Vulnerability Mitigation

whitePaper | June 6, 2023

API Security: Best Practices for Vulnerability Mitigation provides a hands-on approach to mitigate security vulnerabilities in APIs. The paper emphasizes the importance of implementing security measures that protect the API and underlying infrastructure. The paper identifies various security vulnerabilities that can arise in APIs and provides detailed guidelines for securing them. These guidelines cover authentication, authorization, input validation, output encoding, error handling, logging, and auditing.

Read More
news image

Security and Privacy White Paper

whitePaper | October 31, 2022

As cloud-based software solutions become prominent, discussions continue to revolve around security. When organizations implement a cloud-based solution, they put their trust in the solution provider to protect their data and deliver a secure platform.

Read More

Spotlight

ROMAD Cyber Systems

ROMAD - RObust MAlware Detector, a name and brand that truly capture the essence of our uniquely innovative approach to sustainable and reliable malware detection. Our patented threat detection methodology enables our products to identify, analyze, and develop detection profiles for entire viral families, as opposed to specific strains or individual variants. We detect what OTHERS MISS – because we’re not stuck in the perpetual arms race with malware developers, passively looking for their next creation just to figure out how to catch it next time.

Events