Skip to content
Sign Up for Our Newsletter
About
Close About
Open About
About the Institute for Security and Technology
Our Team
Board Of Directors
Careers
Contact Us
Featured Events
Cyber Policy Awards
Critical Effect DC
Projects
Close Projects
Open Projects
AI and NC3
Pioneering action-oriented efforts to explore how advanced AI capabilities will be integrated into nuclear command, control, and communications
AI Antitrust and National Security
Exploring how to more effectively account for national security considerations in AI antitrust cases while respecting precedent, scope, and the core principles of antitrust law
AI Risk Reduction Initiative
Assessing the emerging risks and opportunities of AI foundation models and developing risk reduction strategies
AI Chip Export Control Initiative
Safeguarding U.S. national competitiveness by closing critical compliance and enforcement gaps
AI Risk Barometer
Measuring national security professionals’ perceptions of AI futures through a technically-informed survey
CATALINK
Preventing the onset or escalation of conflict by building a resilient global communications system
Energy FIRST
Powering U.S. and allied security & prosperity through a resilient energy future
Ransomware Task Force (RTF)
Combating the ransomware threat with a cross-sector approach
Religious Voices and Responsible AI
Engaging religious communities on safe and beneficial AI
SL5 Task Force
Strengthening AI security through a multistakeholder approach
UnDisruptable27
Driving more resilient lifeline critical infrastructure for our communities
All Projects
» Explore all of IST's projects, past and current
Focus Areas
Future of Digital Security
Geopolitics of Technology
Innovation and Catastrophic Risk
Events
Insights
Contact
Search
Donate
Analysis
Explore our research
Search
Filters
Analysis Type
Pillar / Project
Source
Topics
Author
Year
Report
Mapping the Ransomware Payment Ecosystem: A Comprehensive Visualization of the Process and Participants
Central to our ability to mitigate the threat of ransomware is the development of a common understanding of the actors, stakeholders, processes, and information, both required for and produced during the ransomware payment process. Yet, when we began this work, such a picture did not exist. We undertook this effort to fill that gap.
mapping
,
ransom payments
,
Ransomware
,
visualization
November 15, 2022
Report
Plan maestro de defensa contra los programas de secuestro
En respuesta a la acción 3.1.1 del Informe del Grupo de Trabajo sobre Programas de Secuestro, en la cual se exhorta a las organizaciones de ciberseguridad a establecer un marco claro y accionable para la mitigación, la respuesta y la recuperación ante programas de secuestro, el Grupo de Trabajo encargado de elaborar un plan de defensa contra los programas de secuestro formuló un plan maestro que abarca un subconjunto de salvaguardias esenciales de ciberhigiene seleccionadas de los controles críticos de seguridad del Centro para la Seguridad de Internet (CIS Controls®) v8.
Blueprint for Ransomware Defense
,
cyber attacks
,
defense
,
Future of Digital Security
,
Ransomware
,
RTF
November 10, 2022
In the News
,
Op-ed
Democracy Gone Digital: The Election Season Online
In an op-ed for Tech Policy Press, Zoë Brammer and Philip Reiner sound the alarm based on our Digital Cognition and Democracy Initiative (DCDI) research. We need to help voters grapple with information overload and unnaturally immersive experience provoked by digital tools, they urge.
DCDI
,
democracy
,
digital cognition
,
election manipulation
November 7, 2022
Report
Cyber Incident Reporting Framework
The Framework lays out a set of model reporting formats the Cybersecurity and Infrastructure Security Agency (CISA) could use as the foundation for the cyber incident reporting.
CIRCIA
,
cyber
,
cybersecurity
,
incident reporting
,
Ransomware
November 3, 2022
Op-ed
Cyber incident reporting isn’t the problem — ignorance is
In an op-ed for The Hill, IST's Chief Strategy Officer Megan Stifel and Cyber Threat Alliance's President & CEO Michael Daniel make the case for reporting cyber incidents.
CIRCIA
,
CISA
,
incident reporting
,
Ransomware
November 2, 2022
Report
Digital Tools, Cognition, and Democracy: A Review of the Literature
This literature review supports a series examining the effects digital technologies have on the following cognitive processes: "Memory," "Attention," and "Reasoning." The broader report series includes three additional papers looking at some of the society-level cognitive and democratic impacts of technology, titled: "Modulating Trust," "Shortcutting Critical Thinking," and "Exploiting Emotions."
attention
,
cognition
,
DCDI
,
democracy
,
emotions
,
Geopolitics of Technology
,
memory
,
reasoning
,
social
October 27, 2022
Previous
Page
1
…
Page
12
Page
13
Page
14
Page
15
Page
16
…
Page
29
Next
Report
A Lifecycle Approach to AI Risk Reduction: Tackling the Risk of Malicious Use Amid Implications of Openness
A Lifecycle Approach to AI Risk Reduction introduces a novel framework for addressing the complex risks associated with AI, and applies this framework to the risk of malicious use.
artificial intelligence
,
risk-mitigation
,
malicious use
,
LLMs
,
AI lifecycle
Testimony
Testimony: Red Alert: Countering the Cyberthreat from China
On May 15, 2024, Chief Trust Officer Steve Kelly testified before the House Committee on Oversight and Accountability Subcommittee on Cybersecurity, Information Technology, and Government Innovation in a hearing entitled, "Red Alert: Countering the Cyberthreat from China."
cybersecurity
,
critical infrastructure
,
China
Progress Report
,
Report
Ransomware Task Force: Doubling Down
While the U.S. government and its partners made great strides in combating ransomware in 2023, attacks have only increased. Of the 48 recommendations made in the original RTF Report, our assessment remains unchanged from a year ago: only 24 have seen significant progress.
cybersecurity
,
Ransomware
,
ransom payments
,
incident reporting
Report
Information Sharing in the Ransomware Payment Ecosystem: Exploring the Delta Between Best Practices and Existing Mechanisms
IST's latest report pulls from a recent attack scenario exercise performed by the Ransomware Task Force's Payments Working Group, comparing the results to information sharing case studies including the Hive disruption operation, the Emotet botnet takedown, and the Colonial Pipeline ransom recovery.
cybersecurity
,
Ransomware
,
ransom payments
,
Colonial Pipeline
,
Emotet
,
Hive
Search
Search
CATALINK
Home
About
CATALINK BRIEF
FAQ
Our Team
Why do we need crisis communications?
Activities
Events
Insights
Podcasts
Press
Get In Touch