INFOSEC

Featured

Technology allows individuals and organizations access to more comprehensive and diverse information, but this access requires that electronic information, networks, data repositories, and data transmissions be adequately safeguarded. RAND has developed a large body of research focused on recognizing the potential threats to information security and data integrity, as well as implications for personal and institutional privacy.

  • U.S. President Joe Biden speaks about the Colonial Pipeline shutdown at the White House in Washington, D.C., May 13, 2021, photo by Kevin Lamarque/Reuters

    Commentary

    How to Deter Ransomware Attacks

    Aug 9, 2021

    To rein in ransomware attacks, the United States needs to upend the risk-reward ratio for hackers and for the countries that harbor or support them. Such a strategy would make networks harder to breach, hit back harder against hackers, and claw back gains from those who succeed.

  • A visual showing how Internet of Bodies technologies may surround and influence us in the future, illustration by Giorgia Lupi

    Project

    Internet of Bodies: Our Connected Future

    Jul 29, 2021

    Information designer Giorgia Lupi, RAND's inaugural artist-in-residence, produced a creative piece that explores questions about how the human body—and society on the whole—may be transformed through Internet of Bodies technology.

Explore Cybersecurity

  • Blog

    RAND Commentary Highlights of 2021

    Vaccine rollouts, an attack on the U.S. Capitol, massive ransomware attacks, the withdrawal from Afghanistan, record numbers of job openings and people quitting, and more. RAND researchers weighed in on all these topics and more.

    Dec 21, 2021

  • Tech. Sgt. Rosa Valdes and Staff Sgt. Rebecca Toland, non-destructive inspection technicians from the 140th Maintenance Squadron, perform an inspection of the 446 bulkhead on a block-30 F-16 Fighting Falcon aircraft. The 446 bulkhead is aft fuselage structure of the F-16 aircraft that supports the tail structure and recent tests have indicated an increased amount of stress cracks in this area, photo by Senior Master Sgt. John Rohrer/U.S. Air National Guard

    Report

    Wing-Level Mission Assurance for a Cyber-Contested Environment

    The authors offer ways to help wings assure their missions despite cyber attacks, focusing on how wings can maintain situational awareness, defend their systems, and respond to and recover from attacks to survive and operate when under cyber attack.

    Dec 9, 2021

  • A woman with a smartphone is seen in front of social media logos, May 25, 2021, photo by Dado Ruvic/Reuters

    Report

    Understanding the Online Extremist Ecosystem

    By the early 2010s, it was clear that the internet provided white supremacists and other extremists a tool to operationalize their hateful ideas and cause real-world harms. How can the average user understand their risk of exposure to extremist content and make informed decisions about the platforms they use?

    Dec 2, 2021

  • Brochure

    Brochure

    Cybersecurity

    This brochure describes RAND Corporation research and analysis in this area, with examples from such diverse areas as organizational planning and implementation and cybersecurity workforce recruitment, retention, and management.

    Nov 30, 2021

  • Close view of a quantum computer, photo by Bartek Wróblewski/Adobe Stock

    Report

    Commercial and Military Applications of Quantum Technology

    There are three main categories of quantum technology: quantum sensing, quantum communication, and quantum computing. How—and when—might these technologies affect national security? And which countries lead in developing them?

    Oct 28, 2021

  • An isometric graphic illustration the supply chain for Internet of Things products.

    Multimedia

    Unraveling the Gordian Knot: Considering Supply Chain Resiliency

    An overview of testimony by Caolionn O'Connell presented before a House Energy and Commerce Subcommittee on Consumer Protection and Commerce on October 14, 2021.

    Oct 14, 2021

  • Brochure

    Brochure

    Select RAND Research on the Information Environment: 2014-2020

    This volume is an important resource for anyone who is interested in gaining an informed understanding of operations in the information environment.

    Oct 7, 2021

  • U.S. Air Force Senior Airman Rose Li, right, hands a notebook to Airman 1st Class Eric Gardella, both 86th Communications Squadron wing cyber readiness technicians, while monitoring malicious network activity during exercise Tacet Venari at Ramstein Air Base, Germany, July 2, 2020, photo by Staff Sgt. Devin Boyer/U.S. Air Force

    Report

    Improving U.S. Air Force Training and Development in the Cyber Field

    The U.S. Air Force has been looking for ways to revamp the training of its offensive and defensive cyberwarfare workforce to develop the best fighting force possible. Is the training and development process that exists now working well for the cyber workforce? Is there a need for improvement?

    Sep 29, 2021

  • Staff Sgt. Alex Garviria, 721st Communication Squadron senior systems controller, and 2nd Lt. Rachel James, 721st CS crew commander, work in the Global Strategic Warning and Space Surveillance System Center at Cheyenne Mountain Air Force Station, Colo., Sept. 2, 2014, photo by Airman 1st Class Krystal Ardrey/U.S. Air Force

    Report

    Attracting and Retaining Enlisted and Civilian Personnel to Build the Best Cyber Workforce

    In addition to revamping the training of its offensive and defensive cyber operators, the U.S. Air Force has also sought to better understand some of the drivers of attraction to and retention in the cyber field. What could the Air Force do to attract and retain the best personnel?

    Sep 29, 2021

  • Two men looking at a mobile phone, photo by Muhammad Faiz Zulkeflee/Unsplash

    Journal Article

    Written Evidence Submitted by RAND Europe: TFP0036 Tech and the Future of UK Foreign Policy

    This document is RAND Europe's submission to the UK Parliament's call for evidence on how the Foreign, Commonwealth and Development Office could support the UK's response to the opportunities and challenges presented by new and emerging technologies.

    Sep 21, 2021

  • A group of people displayed over a map showing digital connections, image by metamorworks/Getty Images

    Commentary

    The Implications for Human Rights in the Digital Age

    As society relies more and more on digital technologies, there are growing implications for human rights and individuals' fundamental freedoms—both positive and negative.

    Sep 3, 2021

  • Tool

    Tool

    The Information Warfighter Exercise Wargame: Rulebook

    This document presents the full ruleset for the Information Warfighter Exercise Wargame, which is used by the Marine Corps to provide training for aspects of operations in the information environment.

    Aug 24, 2021

  • Blog

    Defunding Prisons, Preventing Cyberattacks, Promoting COVID-19 Vaccinations: RAND Weekly Recap

    This weekly recap focuses on defunding prisons, how to deter ransomware attacks, overcoming barriers to COVID-19 vaccination, and more.

    Aug 13, 2021

  • Blog

    Media Literacy, Internet of Bodies, Arctic Governance: RAND Weekly Recap

    This weekly recap focuses on teaching media literacy in schools, a “connected future” via the Internet of Bodies, gaps in Arctic governance, and more.

    Aug 6, 2021

  • Report

    Report

    Human Rights in the Digital Age

    This report provides an overview of human rights in the digital age (HURDA), the trends and challenges associated with them and the capacity-building approaches that have been adopted to foster and protect them.

    Aug 4, 2021

  • Report

    Report

    DoD Cyber Excepted Service Labor Market Analysis and Options for Use of Compensation Flexibilities

    In this report, the authors examine labor demand and supply for seven U.S. Department of Defense cyber work roles to help determine whether pay adjustments are necessary to support the recruitment and retention of critical personnel.

    Jul 19, 2021

  • Capt. Sarah Miller and Tech. Sgt. Carrol Brewster discuss options in response to a staged cyber attack during filming of a scene for an AFRC mission video at Joint Base San Antonio-Lackland, Texas, June 1, 2019, photo by Maj. Christopher Vasquez/U.S. Air Force

    Report

    Combating Foreign Disinformation on Social Media

    Disinformation campaigns on social media pose a nuanced threat. But much of the U.S. response remains ad hoc and uncoordinated. It's unclear who has the edge moving forward, because disinformation techniques and countermeasures are evolving simultaneously.

    Jul 19, 2021

  • Marines with Marine Corps Forces Cyberspace Command pose for photos in the cyber operations center at Lasswell Hall

    Report

    Chinese Disinformation Efforts on Social Media

    The authors identify key Chinese practices and the supporting infrastructure and conditions that successful social media disinformation campaigns require, concluding that China is using Taiwan as a test bed for developing attack vectors.

    Jul 19, 2021