Policy-based access control (PBAC) also known as Policy Based Access Management, is a security model that manages and enforces access to resources based on a set of policies rather than…
Learn MoreAs products become more complex, companies, even the government/military, find themselves in increasingly distributed and collaborative supply chains. This paper describes some of the key challenges to protecting IP within…
Learn MoreEveryone agrees threats to cyber security are on the rise. But how well do organizations understand which threats they should worry the most about? This white paper describes the most…
Learn MoreThe latest Antitrust Guidelines from the Department of Justice and Federal Trade Commission reinforce protections for workers by ensuring fair competition in labor markets. These guidelines highlight practices that may…
Learn MoreSafeguarding Controlled Unclassified Information (CUI) is more critical than ever, and NIST SP 800-171 provides the necessary framework to ensure its protection across non-federal systems. With evolving threats, the 14…
Learn MoreThe conservative “techlash” highlights tensions between Big Tech’s influence and conservative ideals of limited government. While aiming to address concerns like censorship and market dominance, some proposals risk economic and…
Learn MoreIn early 2024, the authoring organizations observed pro-Russia hacktivists targeting vulnerable industrial control systems in North America and Europe. Cybersecurity and Infrastructure Security Agency and the Federal Bureau of Investigation…
Learn MoreAntitrust has become a hot topic. After decades as a mostly technocratic discipline, competition policy now commands the attention of lawmakers, academics, and the general public. One of the driving…
Learn MoreU.S. antitrust doctrine has long focused on the consumer welfare standard, particularly the effect of competition on prices. This poses a challenge for anti-“Big Tech” activists (neo-Brandeisians) because many digital…
Learn More