4 Items

3D rendering of cyber security and system crash

Adobe Stock

Analysis & Opinions - Harvard Business Review

The Cybersecurity Risks of an Escalating Russia-Ukraine Conflict

With the looming threat of increased conflict in Ukraine, businesses around the world should be preparing now, write Paul R. Kolbe, Maria Robson Morrow, and Lauren Zabierek. Corporate security and intelligence teams have said they’re seeing an increase in cyber probes, and the U.S. Cybersecurity and Infrastructure Security Agency and the European Central Bank have both issued warnings about potential Russian cyberattacks. At this point, companies should be taking the following steps: 1) Review business continuity plans; 2) Closely examine supply chains; 3) Actively engage peer networks, vendors, and law enforcement around cyber intrusions; 4) Instill a security mindset in employees; and 5) Make sure corporate intelligence and IT teams are working closely together on solutions.

man wearing a shirt promoting TikTok

AP/Ng Han Guan

Analysis & Opinions - Project Syndicate

The Other Global Power Shift

| Aug. 06, 2020

Joseph Nye writes that the world is increasingly obsessed with the ongoing power struggle between the United States and China. But the technology-driven shift of power away from states to transnational actors and global forces brings a new and unfamiliar complexity to global affairs.

Paper - Potomac Institute for Policy Studies

Cyber Readiness Index 2.0

    Authors:
  • Chris Demchak
  • Jason Kerben
  • Jennifer McArdle
  • Francesca Spidalieri
| November 30, 2015

"Building on CRI 1.0, Cyber Readiness Index 2.0 examines one hundred twenty-five countries that have embraced, or are starting to embrace, ICT and the Internet and then applies an objective methodology to evaluate each country's maturity and commitment to cyber security across seven essential elements."

Book Chapter

Creating a Secure Network: The 2001 Anthrax Attacks and the Transformation of Postal Security

| June 2014

The author critically examines the creation and implementation of new security standards within the postal network after the 2001 anthrax attack. Drawing on research conducted at the Smithsonian Institution and documents obtained under the Freedom of Information Act (FOIA), the article traces the politics inscribed within the architecture of new security technologies. The article sets debates about postal security within a broader account of political economy. The article emphasizes the possibilities and limitations of disasters to create moments of disruption and undergird new political interventions.