Insights & Research

Blog

Examining the Intricacies of AI Governance

As U.S. federal agencies move to take advantage of the potential benefits of artificial intelligence they are also wondering how to structure governance of these new systems.

Risks Associated with IT Monoculture Needs Further Examination

IT concentration risk is a relatively new term but due to recent cyberattacks it has been front and center. To examine the issue the Center conducted an exercise to look at the threats of IT concentration risk and offer recommendations.

The National Vulnerability Database with Kent Landfield and John Banghart (DCP S2 E4)

In our latest Distilling Cyber Policy podcast episode, our hosts are joined by John Banghart and Kent Landfield to discuss the latest developments and ongoing debate around the National Vulnerability Database.

Cyber Leaders Discuss a Common AI and Cyber Vision in LATAM

Industry, government, and civil society stakeholders from across Latin America, the EU, and U.S. convened in Colombia last month for a roundtable discussion "Towards a Common AI and Cyber Vision in LATAM," hosted by the Digi Americas Alliance.

Building Digital Solidarity: The New International Cyberspace and Digital Policy Strategy

U.S. State Department releases International Cyberspace & Digital Policy Strategy, building off the U.S. National Cybersecurity Strategy.

Event Recap - Advancing Risk Management: Cybersecurity, Privacy and AI

The CCPL hosted a half-day event during the RSA Conference in San Francisco featuring speakers from the NIST and the NCCoE to talk about the Cybersecurity, Privacy, and AI risk management frameworks.

CISA Promotes Secure by Design Principles with Industry Pledge

CISA announced its “Secure by Design Pledge,” a voluntary commitment by software manufacturers to work towards implementing several cybersecurity best practices.

CISA in the Driver’s Seat Over Critical Infrastructure

The Biden Administration released a new National Security Memorandum that aims to strengthen the U.S. critical infrastructure.

Is it Time for Mandatory Multifactor Authentication?

In the wake of the Change Healthcare breach – caused by compromised credentials and no multifactor authentication (MFA) on a remote access server – is it time for government to mandate MFA for critical infrastructure organizations?

The UK PSTI Act Comes into Effect

The UK’s Product Security and Telecoms Infrastructure Act comes into effect today and If you are doing business in the UK and are a manufacturer or retailer of consumer smart products find out the implications.