Cybersecurity

Featured

Technology allows individuals and organizations access to more comprehensive and diverse information, but this access requires that electronic information, networks, data repositories, and data transmissions be adequately safeguarded. RAND has developed a large body of research focused on recognizing the potential threats to information security and data integrity, as well as implications for personal and institutional privacy.

  • Commentary

    Software Supply Chain Risk Is Growing, but Mitigation Solutions Exist

    Software supply chain security has emerged as a leading risk because of the massively fragmented and decentralized nature of modern software development. While we still have much to learn as a community about this risk, there are concrete steps we can take to better understand and mitigate it.

    Jan 26, 2023

  • Report

    Preparing for Post-Quantum Critical Infrastructure

    Quantum computers are expected to create vulnerabilities in critical infrastructure. How vulnerable are critical functions, such as distributing electricity and protecting sensitive information? And how can the government help infrastructure owners and operators?

    Aug 18, 2022

Explore Cybersecurity

  • The new Smart concept autonomous car Vision EQ fortwo model is presented during the Frankfurt Motor Show (IAA) in Frankfurt, Germany, September 12, 2017

    Commentary

    Autonomous Vehicles: Terrorist Threat or Security Opportunity?

    Terrorist groups that track developments in technology could be considering using self-driving cars in place of suicide bombers or for ramming attacks. But autonomous vehicle capabilities offer a range of potential benefits to law enforcement and security operations, too.

    Jan 3, 2018

  • A child poses with a Lego Boost set, a predicted top seller this Christmas, at the Hamleys toy store in London, Britain, October 12, 2017

    Commentary

    Smart Toys May Pose Risks

    Parents shouldn't avoid buying smart toys during the holidays, particularly if these devices top children's Christmas lists. But parents should definitely be wary of the security and privacy risks that smart toys can pose.

    Dec 21, 2017

  • Criminal hiding behind a mask on computer screen asking the owner for money

    Commentary

    The WannaCry Cyber Attack Could Be the First of Many If the NHS Takes No Action

    In the UK, the National Health Service (NHS) was one of the organizations most severely affected by the WannaCry ransomware. The NHS and other public sector organizations need to improve their cybersecurity processes and quickly before a more severe cyber attack takes place.

    Dec 1, 2017

  • Computer hacker with magnifying glass

    Commentary

    It's Time for the International Community to Get Serious About Vulnerability Equities

    Multiple countries around the world are likely discovering, retaining and exploiting zero-day vulnerabilities without a process to properly consider the trade-offs. This needs to change. It’s time for the international community to get serious about vulnerability equities.

    Nov 15, 2017

  • Trading information about Equifax and the company logo are displayed on a screen on the floor of the New York Stock Exchange, September 8, 2017

    Commentary

    The Equifax Breach: Yawn, or Yikes?

    In cases where personal information is exposed, such as the Equifax data breach, it is critical that consumers take steps to ensure their information is not abused. The simplest and perhaps the most effective way to enhance personal digital security is to protect account credentials using password management software.

    Nov 3, 2017

  • Hands typing with visual of computer code

    Multimedia

    Equifax and the Data-Breach Era: How Worried Should We Be?

    Large-scale data breaches like those of Equifax and OPM compromised the personal data of millions of people. What can be done to improve the response to such breaches? In this October 26th congressional briefing, Lillian Ablon and Sina Beaghley address victim and lawmaker reactions, national security implications, and considerations for policymakers.

    Oct 26, 2017

  • Periodical

    Periodical

    RAND Review: November-December 2017

    This issue highlights recent RAND research on post-9/11 military caregivers; RAND-Lex, a computer program built at RAND that can analyze huge data sets of text; and the implications of climate change on Arctic cooperation.

    Oct 19, 2017

  • Credit cards, a chain, an open padlock, and a computer keyboard are visible next to the Equifax logo

    Commentary

    Equifax and the Data-Breach Era

    The personal and financial data of almost 146 million U.S. consumers has been compromised by the Equifax breach, the latest in a long line of high-profile hacks. Do consumers worry enough about such breaches? And what options are available to Congress?

    Oct 18, 2017

  • Tool

    Tool

    Roadmap to Succeed in the Open for the National Geospatial-Intelligence Agency's Human Development Directorate

    This tool provides the National Geospatial-Intelligence Agency's Human Development Directorate with a roadmap for how employees can overcome the hurdles to achieving the agency's missions outside of secure and classified environments.

    Sep 26, 2017

  • Woman using smartphone and laptop with icon graphic cyber security network of connected devices and personal data security

    Commentary

    How to Help Small Businesses Deal with Cyber Threats

    Small businesses are especially vulnerable to cyber threats. What can be done to provide small businesses the security to continue to prosper, while enhancing America's cybersecurity workforce and making the economy more secure?

    Sep 15, 2017

  • Hacked internet of things

    Commentary

    Gaming Policy in Cyberspace

    Hacked devices and intellectual property theft are a rich hunting ground for policy development. The challenge posed by Internet-connect devices is only getting worse as the number of online devices continues to grow.

    Aug 23, 2017

  • Digital devices on a map of Australia

    Report

    Australia's Cyber Security Policy Options

    An exercise with participants from government, industry, think tanks, academia, and the media explored opportunities to improve cyber security and inform Australia's strategy. Recommendations include creating and enforcing technology security standards, crafting international agreements to address challenges, and increasing awareness to keep users safe online.

    Aug 7, 2017

  • The U.S. Capitol building illuminated at night in Washington, D.C.

    Blog

    RAND's Summer Reading List for Congress

    Hill staffers can make the most of the Congressional recess with this list of must-read research and commentary on the policy issues they will be addressing this fall.

    Aug 4, 2017

  • Girl Scouts compete in the Mission Ocean Challenge during the USS California Science Experience at Naval Surface Warfare Center, November 6, 2010

    Commentary

    Cybersecurity Badge: One Big Step for Girl Scouts, Potentially Giant Leap for Women

    The Girl Scouts will start offering 18 cybersecurity badges next year. In addition to exposing girls to cyber concepts and challenges, this could encourage them to pursue cybersecurity or other STEM careers in which women are underrepresented.

    Aug 3, 2017

  • Computer hacker working on laptop late at night in office

    Commentary

    Connect, Buy-Now, Fire: How the Dark Web Allows Criminals to Buy Weapons—Anonymously

    Despite its small size compared to the offline market, the ability of the dark web to anonymously arm individuals of all backgrounds needs to be taken seriously. Its potential impact on international security is significant.

    Jul 25, 2017

  • Russian President Vladimir Putin speaks during a news conference after the G20 summit in Hamburg, Germany, July 8, 2017

    Commentary

    Russian Information Warfare: A Reality That Needs a Response

    For the last three decades, Russia has exploited its growing capabilities in cyberspace to spy on, influence, and punish others. The West will continue to struggle to hold Moscow accountable, in part because international law falls far short of fully defining the rules or resolving conflicts.

    Jul 21, 2017

  • News Release

    News Release

    US Weapons Main Source of Illegal Arms Trade on the Dark Web

    The illegal sales on the dark web of firearms, weapons, explosives, and banned digital guides on homemade products present challenges for law enforcement agencies and national governments. Its potential to anonymously arm criminals and terrorists, as well as vulnerable and fixated individuals, is the most dangerous aspect.

    Jul 19, 2017

  • A laptop computer, a 9mm handgun, and bullets

    Report

    U.S. Weapons Are the Main Source of Illegal Arms on the Dark Web

    Sixty percent of weapons on sale on the dark web come from the United States. This illicit market for firearms, explosives, and ammunition can anonymously arm criminals, terrorists, and others.

    Jul 19, 2017

  • A man holds a laptop computer as cyber code is projected on him

    Report

    Could Stateless Attribution Promote International Cyber Accountability?

    The public may respond to government claims about who is behind a cyberattack with suspicion and confusion. Could an independent, global organization for cyber attribution help?

    Jun 2, 2017

  • A student in the Army's first Cyber Basic Officer Leader Course uses a field computer to probe for a targeted wireless network signal during a field training exercise at Fort Gordon, Georgia, February 1, 2017

    Commentary

    What Happens After ISIS Goes Underground

    As the Islamic State in Iraq and Syria suffers defeats on the battlefield, it is expanding its cyber presence to continue to encourage attacks abroad. The more the group relies on cyberspace, the more likely it will expose important segments of its organization to detection and disruption.

    May 30, 2017