Insights & Research

Cybersecurity

Cybersecurity Awareness Month Series: Quantum Computing

This one-pager outlines what quantum computing is, why it poses both extraordinary opportunities and serious risks, and what steps policymakers and industry leaders must take to prepare.

Cybersecurity Awareness Month Series: CISA 2015

October is Cybersecurity Awareness Month, and we’re launching an educational one-pager series spotlighting the policies and frameworks that shape our collective defense.

CyberNext DC 2025 Recap

The Cybersecurity Coalition and the Cyber Threat Alliance hosted the 9th annual CyberNext DC, convening innovators, policymakers, and security experts to explore the pressing challenges and innovative responses shaping the cybersecurity space.

Shoring Up Subsea Security: A Comprehensive Action Plan to Promote Submarine Cable Resiliency, Security, & Governance

Submarine cables are the essential infrastructure enabling the global economy. This paper recommends enhancing the resilience of the ecosystem through greater route diversity and redundancy, rapid repair capacity, and secure supply chain.

Connect the Terms: The Cyber Policy Watchlist

Challenge yourself to connect words into four mystery categories.

Recap - Offensive Cyber Operations: Charting a Legal and Strategic Path Forward

The discussion around offensive cyber operation may be quickly moving from theoretical to practical and CCPL’s “Offensive Cyber Operations: Charting a Legal and Strategic Path Forward,” looked at the challenges around this topic.

Center’s New Amicus Brief in Epic v. Google: Competition Should Not Come at the Expense of Cybersecurity

In too many competition cases, cybersecurity has become an afterthought - the Center is seeking to halt this trend filing a series of amicus briefs seeking to educate the courts about core security consideration to correct lower-court overreach.

AI Governance in Latin America

Artificial intelligence is no longer a technology of the future, it is already transforming how societies function. But these tools need some level of oversight and this is explored in the latest white paper from the Digi Americas Alliance.

Offensive Cyber Operations

Tuesday, August 26, 2025

How Existing Security Frameworks Can Help Meeting Bulk Data Rule Security Requirements

The DOJ bulk data rule prohibits certain transactions involving the sale or transfer of sensitive data. This post examines the security requirements and explains their interaction with existing cybersecurity and risk management frameworks and regs.