Updated August 14, 2013
How can the United States protect cyberspace "control system of our country," without restricting the open "flow of information on the Internet"? What should countries consider when developing international cybersecurity standards and protocol? What should their citizens know to protect their information and their rights? Cybersecurity Policy Research Links provide news, background information, legislation, analysis, and international efforts to protect government and the public's information.
Research Links on Cybersecurity Policy are divided into:
Blogs, news briefs, and industry updates.
From updates on brands, to technology in the military, health, and business fields, to concerns like privacy, security, political, and legal issues.
Monthly free newsletter from Bruce Schneier, who "explains, debunks, and draws lessons from security stories that make the news."
Businesses and their cybersecurity news, reports, and awards.
"Cyber war and the latest in military technology."
Publishes information security news to help banking executives, credit unions, government and healthcare officials, and IT professionals manage risk in their sectors.
Includes free newsletters for IT professionals, Government, and others interested in technology. Dark Reading is aimed at business and data security.
"Technology and the business of government"; latest articles about cybersecurity from government, technology, and executive sources.
Analysis and news coverage for security professionals; with links to cybesecurity blogs of the Kaspersky Lab News Service.
Aggregates news from mostly mainstream sources related to cybersecurity.
"Privacy, crime, and security online"
Links to primary (policies, reports, events) and secondary sources (news).
(PDF, April 26, 2012) legistlation and hearings from 112th Congress, executive orders, data sources, glossaries, reports by topic, and other websites.
Working on strategic history of cyber conflict.
Oral history and digital archive of government, private sector, academic, and media initiatives and reports related to cybersecurity., as well as related websites
Real-time and historical traffic from around the world; government and copyright owners requests for content removal; government requests for user data.
Definitions, case studies, and annotated bibliography of government documents andhearings, nongovernmental reports, news and journal articles.
1949-2008
Official documents, books, reports, websites, some free articles. Updated frequently with relevant and authoritative resources.
From National Defense University; news sources and analysis, including reports and speeches from both U.S. and international officials and scholars, primary sources on U.S. cybersecurity policy, and resources on the types and effects of cybersecurity.
Computer security research, guidelines for effective cyber defense, thought leaders, glossary, intrusion detection FAQs. Links to other SANS projects, like Internet Storm Center.
(PDF, January 2012) includes survey of 250 experts from around the world about strengths and vulnerabilities for 21 countries.
2012 data; "the majority of executives...are confident in the effectiveness of their organization’s information security practices."
Survey of attitudes toward cyberwarfare and cyber-espionage, as well as other IT security developments and statistics.
(PDF, March 2012) sponsored by Symantec.
Build your own report, view charts, related white papers.
See also Must Reads on cybersecurity, CFR.org's collection of the best online analyses and inquiries on foreign policy.
Last updated September 2010
"Quarterly series of roundtable discussions...to offer solutions to major challenges facing the world." Includes interviews and solutions proposed from tech thought leaders; infographic on cybersecurity costs, related articles.
Full-text readable online.
Aggregates latest policies and articles from government, think tank, and industry sources.
See also for resources: http://www.dhs.gov/files/cybersecurity.shtm .
Disclosure obligations relating to cybersecurity risks and cyber incidents.
Links to policies and departments involved.
(June 2011)
(March 2011)
(PDF, September 2011)
Priorities, annual reports, threats and scams, cases and partnerships.
(July 2010)
(December 2011)
Database to search scientific government publications.
(PDF, December 2011)
Mission of website: "To simplify, clarify, and unify the ECPA standards, providing stronger privacy protections for communications and associated data...while preserving the legal tools necessary for government agencies to enforce the laws, respond to eme
In October 2011, Task Force presented recommendations to guide legislation regarding cybersecurity.
Congressional Bills and Statuses; search for "cyber."
(PDF, January 31, 2012) Testimony of Director of National Intelligence, James Clapper.
"Conducts its work through partnerships between government and private industry, the venture capital community, and the research community."
Subtopics include Internet Governance, IT Security and Threats, International Technology Policy.
Fact sheet, conferences, training. By January 2013, Europol will establish a European Cybercrime Centre
Dashboard for NATO news, initiatives, and publications on cyberdefense.
(2010)
(PDF, May 2011)
(July 21, 2011)
(PDF, December 15, 2010) discusses lessons learned from Scholarship for Service, a government program to fund cybersecurity education and secure an IT federal workforce.
(PDF, July 2011) how to protect "tremendous economic and social value of the Internet, without stifling innovation."
"Resource page provides information related to all aspects of cybersecurity for higher education, with an emphasis on strategies, policies, and other tools that will assist institutions of higher education to prevent, detect, respond to vulnerabilities."
After SOPA and PIPA elicited strong reactions from citizens and online organizations, OPEN was proposed, aimed to "protect creative ownership in America while securing the open, accessible Internet you deserve."
2011 report: "nearly all business records...exist primarily in digital form. Cyberspace makes it possible for foreign collectors to gather enormous quantities of information quickly and with little risk."
Will the Obama administration show a greater interest in Africa in the second term?
The Future of U.S. Special Operations Forces
Special operations play a critical role in how the United States confronts irregular threats, but to have long-term strategic impact, the author argues, numerous shortfalls must be addressed.
Reforming U.S. Drone Strike Policies
The author analyzes the potentially serious consequences, both at home and abroad, of a lightly overseen drone program and makes recommendations for improving its governance.
The biggest threat to America's security and prosperity comes not from abroad but from within, writes CFR President Richard N. Haass in his provocative new book. More
October 31 Application Deadline:
International Affairs Fellowship (IAF)
IAF in Japan
December 16 Application Deadline:
Stanton Nuclear Security Fellowship
January 17 Application Deadline:
IAF in Nuclear Security
March 1 Application Deadline:
Edward R. Murrow Press Fellowship
For application instructions and more information, visit www.cfr.org/fellowships.
The Clash of Civilizations? The Debate: Twentieth Anniversary Edition
This volume brings together a broad range of Foreign Affairs content to commemorate the twentieth anniversary of Samuel Huntington’s classic article “The Clash of Civilizations?” More
Defending an Open, Global, Secure, and Resilient Internet
This Independent Task Force report finds that as more people and services become interconnected and dependent on the Internet, societies are becoming increasingly vulnerable to cyberattacks.
U.S.-Turkey Relations
This Independent Task Force asserts that Turkey is an increasingly influential regional and economic power and calls for the United States and Turkey to forge a new partnership.
Pathways to Freedom
An authoritative and accessible look at what countries must do to build durable and prosperous democracies—and what the United States and others can do to help. More
The Power Surge
A groundbreaking analysis of what the changes in American energy mean for the economy, national security, and the environment. More
Two Nations Indivisible
Through an in-depth analysis of modern Mexico, Shannon O'Neil provides a roadmap for the United States' greatest overlooked foreign policy challenge of our time—relations with its southern neighbor. More
To request permission to reprint or reuse CFR material, please fill out this permissions request form (PDF), referring to the instructions on page 1.