How Costa Rica Found Itself At War Over Ransomware

Belisario Contreas's opinion piece in CSO explains how Costa Rica failed to implement the cyber-preparedness strategy that it laid out five years ago and now serves as an example not only to other Latin American nations but also to the world.

Mobile Future: Pathways to Continued Improvement in Mobile Security and Privacy

As cybersecurity experts across the digital economy struggle to keep pace with ever-evolving threats, advancements in mobile security and privacy offer a vision into how security can be done properly while enabling continuous improvement. While new…

Enterprise Environment Visibility

Evolution in technology often creates challenges as governments and industry seek to balance the tradeoffs between security, privacy, visibility, and efficiency. When done correctly, these four elements combine to enable products and services that…

The Future of FedRAMP

As public sector entities move to modernize their IT infrastructure and citizen services, governments want to harness the speed, flexibility and security of cloud services. More and more Federal departments and agencies are investing in the cloud…

Enterprise Data Center Transparency and Security Workshop Summary Report

This summary report on the Enterprise Data Center Transparency and Security Workshop represents a summary of the workshop itself and does not necessarily represent the views of the Center or any of the participating organizations. Future work is…

Improving Hardware Component Vulnerability Disclosure

To address concerns about security gaps across a growing number of connected devices, the Center for Cybersecurity Policy and Law has released a new report to help hardware vendors minimize risks for end users. The paper, “Improving Hardware…

Center for Cybersecurity Policy and Law to Engage with Industry on Coordinated Vulnerability Disclosure Practices for Hardware

The Center for Cybersecurity Policy and Law announced a new cybersecurity effort to examine coordinated vulnerability disclosure policy and processes specific to hardware…