Skip to content
Sign Up for Our Newsletter
About
Close About
Open About
About the Institute for Security and Technology
Our Team
Board Of Directors
Careers
Contact Us
Featured Events
Cyber Policy Awards
Critical Effect DC
Projects
Close Projects
Open Projects
AI and NC3
Pioneering action-oriented efforts to explore how advanced AI capabilities will be integrated into nuclear command, control, and communications
AI Antitrust and National Security
Exploring how to more effectively account for national security considerations in AI antitrust cases while respecting precedent, scope, and the core principles of antitrust law
AI Risk Reduction Initiative
Assessing the emerging risks and opportunities of AI foundation models and developing risk reduction strategies
AI Chip Export Control Initiative
Safeguarding U.S. national competitiveness by closing critical compliance and enforcement gaps
AI Risk Barometer
Measuring national security professionals’ perceptions of AI futures through a technically-informed survey
CATALINK
Preventing the onset or escalation of conflict by building a resilient global communications system
Energy FIRST
Powering U.S. and allied security & prosperity through a resilient energy future
Ransomware Task Force (RTF)
Combating the ransomware threat with a cross-sector approach
Religious Voices and Responsible AI
Engaging religious communities on safe and beneficial AI
SL5 Task Force
Strengthening AI security through a multistakeholder approach
UnDisruptable27
Driving more resilient lifeline critical infrastructure for our communities
All Projects
» Explore all of IST's projects, past and current
Focus Areas
Future of Digital Security
Geopolitics of Technology
Innovation and Catastrophic Risk
Events
Insights
Contact
Search
Donate
Analysis
Explore our research
Search
Filters
Analysis Type
Pillar / Project
Source
Topics
Author
Year
Op-ed
Here’s the Big Deal Trump and Putin Could Actually Reach in Alaska
The meeting of Presidents Trump and Putin in Alaska this week presents a rare and urgent opening for both leaders to make tangible progress on nuclear arms control, IST Senior Policy Advisor Sahil V. Shah and co-author IMEMO RAS research fellow Dmitry Stefanovich argue in Politico.
arms race
,
CATALINK
,
crisis communication
,
New START Treaty
,
Russia
August 15, 2025
Video
Picture Your Hospital
What happens when a hospital — your hospital — can't delivery timely care?
critical infrastructure
,
emergency care
,
hospital cybersecurity
,
hospitals
,
patient care
,
water
August 15, 2025
Report
Improving Private Sector Cyber Victim Notification and Support
Building off the Cyber Safety Review Board’s recommendation that cloud service providers work with mobile device platform vendors to develop an “amber alert”-style notification mechanism, IST Adjunct Advisor Rob Knake explores the challenges to developing the native-notification concept and lays out a roadmap for overcoming them.
cyber
,
incident response
,
Victim Notification
August 14, 2025
Memo
,
Primer
Cybersecurity Considerations for Universal Service Fund Reform
As the speed, scope, and impact of cyber threats to K-12 schools continues to increase, Congress has expressed a clear desire to reinvigorate the Universal Service Fund (USF) through legislation. IST SVP for Policy Nicholas Leiserson explores how USF funding, through the FCC's E-Rate Program, could bolster cybersecurity resources for K-12 schools.
congress
,
cyber
,
cybersecurity
,
E-Rate
,
education
,
k-12
,
schools
,
Universal Service Fund
,
USF
July 25, 2025
AAR
,
Report
Exercise VEIL STORM I: After Action Report
In partnership with Europol, the Institute for Security and Technology and the Ransomware Task Force’s International Engagement Working Group designed and delivered Exercise VEIL STORM I, a tabletop exercise focused on operational collaboration across international law enforcement agencies and private sector firms in responding to cyber incidents. This after-action report summarizes the proceedings and key takeaways of the exercise.
cyber insurance
,
cybersecurity
,
disruption
,
Europol
,
information sharing
,
operational collaboration
,
public-private collaboration
,
Public-private partnerships
,
Ransomware
July 23, 2025
Report
Plan directeur de défense contre les rançongiciels
En réponse à la mesure 3.1.1 du rapport du Groupe de travail sur la lutte contre les rançongiciels, qui recommande à la communauté de la cybersécurité d’« élaborer un cadre clair de mesures exécutables d’atténuation, d’intervention et de récupération relatives aux rançongiciels », le Groupe de travail sur le Plan directeur de défense contre les rançongiciels a intégré au présent document un sous-ensemble structuré de mesures de protection essentielles en matière de cyberhygiène3, puisées dans le site Web Contrôles de sécurité essentiels du contrôles du CIS® v8.
blueprint
,
cybersecurity
,
defend
,
protect
,
Ransomware
,
respond
July 14, 2025
Previous
Page
1
Page
2
Page
3
Page
4
Page
5
Page
6
…
Page
29
Next
In the News
,
Op-ed
Nick Leiserson and Michael Klein: Urgent Changes Needed to Update the E-Rate Program
For Broadband Breakfast, IST Senior VP for Policy Nicholas Leiserson and Senior Director for Preparedness and Response Michael Klein make the case for expanding the FCC’s E-Rate program to bolster the cybersecurity resilience of K-12 schools.
cybersecurity
,
Ransomware
,
Universal Service Fund
,
E-Rate
,
K-12 Education
In the News
,
Op-ed
Reauthorization of CISA ’15: 10 Years Later, New Threats, Exigent Urgency
In an op-ed for Claroty Nexus, IST Chief Strategy Officer Megan Stifel calls on Congress to reauthorize the Cybersecurity Information Sharing Act of 2015 (CISA ’15), which improves and incentivizes the sharing of cyber threat indicators and information about defensive measures taken against cyber threats between public and private sectors.
cybersecurity
,
congress
,
information sharing
,
public-private collaboration
,
CISA 15
Report
Artificial Intelligence in Nuclear Command, Control & Communications: A Technical Primer
AI has been integral to nuclear weapons systems and operations for decades, but rapidly advancing “novel” models pose unforeseen technical opportunities. For the Institute for Security and Technology’s scenario-driven workshop on the integration of AI into NC3 systems, IST’s Sylvia Mishra and Philip Reiner co-authored a short primer to establish what constitutes 'novel' AI in the context of nuclear weapons decision-making.
NC3
,
artificial intelligence
,
nuclear
,
AI
,
system of systems
In the News
Michael Klein joins press conference announcing $3.7 million grant for Kentucky school cybersecurity
IST Senior Director for Preparedness and Response Michael Klein joined a Jefferson County Public Schools press conference in Louisville, Kentucky to announce a $3.7 million award from the Federal Communications Commission to bolster the district’s cybersecurity defenses.
cybersecurity
,
cyber
,
k-12
,
Universal Service Fund
,
E-Rate
,
education
,
FCC
,
USF
Search
Search
Home
About
CATALINK BRIEF
FAQ
Our Team
Why do we need crisis communications?
Activities
Events
Insights
Podcasts
Press
Get In Touch