Cyber Industrial Policy in an Era of Strategic Competition

May 22, 2019

Cybersecurity has become a central political and economic challenge for governments and businesses around the world. But while election hacking, malware, and cyber warfare have dominated the public discourse, the academic and policy communities have largely ignored the diverse industrial policies that governments can use to bolster their domestic cybersecurity and technology industries.

Spotlight

Technology Ventures

Technology Ventures is a leading technology services company delivering a broad portfolio of business and technology solutions and staffing to help its clients improve their business performance. Our core portfolio comprises information-technology staffing, software applications and business process outsourcing services to clients in the financial services, healthcare, communications, consumer and retail industries and to governments.

OTHER WHITEPAPERS
news image

Recommended Criteria for Cybersecurity Labeling of Consumer Software

whitePaper | February 4, 2022

Software is an integral part of life for the modern consumer. Nevertheless, most consumers take for granted and are unaware of the software upon which many products and services rely. From the consumer’s perspective, the very notion of what constitutes software may even be unclear. While enabling many benefits to consumers, that software that is, software normally used for personal, family, or household purposes can also have cybersecurity flaws or vulnerabilities which can directly affect safety, property, and productivity.

Read More
news image

The ‘Zero Trust’ Model in Cybersecurity: Towards understanding and deployment

whitePaper | August 24, 2022

In the last couple of years, “zero trust” has gained significant traction in the cybersecurity realm as a means to protect networks and increase security across organizations. In part, the growing popularity of this security model can be attributed to the shift to hybrid working practices that call for a more secure work environment whether on- or off-premises.

Read More
news image

Network Traffic Analysis (NTA): A Cybersecurity ‘Quick Win’

whitePaper | February 27, 2020

According to research from ESG and the Information Systems Security Association (ISSA), 91% of cybersecurity professionals believe that most organizations are either extremely or somewhat vulnerable to a significant cyber-attack or data breach.1 This level of cyber-risk demands immediate attention and action from CISOs, CIOs, and business executives. As a result, 62% of organizations plan to increase cybersecurity spending in 2020.2 Here’s the problem: Increasing security budgets alone isn’t enough. CISOs need quick and easy wins that can greatly bolster security efficacy and streamline operations without demanding massive projects and vast resources. There is a lot of work ahead. This white paper concludes.

Read More
news image

Cybersecurity - for safe and secure mobility

whitePaper | June 6, 2022

In a world that is increasingly connected and digital, cybersecurity is no longer simply an operational requirement – it is an economic necessity that is vital to the ongoing health of any business.

Read More
news image

Is Cyber Security Meeting Today’s Intensifying Challenges?

whitePaper | September 22, 2022

Cybersecurity has always been critical, but it’s taken on new urgency today. Cyberattacks have escalated in intensity and volume. At the same time, IT is experiencing the pressing challenges of a technology modernization revolution. Driving this tech revolution are remote work environments, a skills shortage and unprecedented growth in cloud deployments. These developments bring increasing requirements to proactively secure environments, deflect risks and rapidly respond to cyberattacks.

Read More
news image

Supply Chain Security in MongoDB’s Software Development Lifecycle

whitePaper | May 25, 2022

Cybersecurity breaches do more than expose data to malicious actors. They generate headlines, captivate the public’s attention, and shine a light on security gaps. Whether it’s weak passwords or the software supply chain, if a vulnerability exists, cybercriminals will exploit it.

Read More

Spotlight

Technology Ventures

Technology Ventures is a leading technology services company delivering a broad portfolio of business and technology solutions and staffing to help its clients improve their business performance. Our core portfolio comprises information-technology staffing, software applications and business process outsourcing services to clients in the financial services, healthcare, communications, consumer and retail industries and to governments.

Events