500 Results for:

February 18, 2016

Privacy
Protecting Data Privacy With User-Friendly Software

Protecting the privacy of user data from unauthorized access is essential for business executives, policymakers, and users themselves. The pace of targeted attacks and massive data breaches is only i…

Protecting Data Privacy With User-Friendly Software header

December 1, 1999

Emerging Markets
Building the Financial Infrastructure for Middle Class Emerging Economies

Overview The export-led growth model for emerging economies is driven by their need to service external debt and build foreign exchange reserves. It has foundered in the aftermath of financial cri…

weblogolarge_63.jpg

May 15, 2018

Cybersecurity
Sharing Classified Cyber Threat Information With the Private Sector

Critical infrastructure companies cannot protect themselves from adversarial nation-states without federal assistance. The U.S. government should create a classified network to share information on c…

Staff members sit at their workstations at the National Cybersecurity and Communications Integration Center in Arlington, Virginia, on January 13, 2015.

January 4, 2024

Conflict Prevention
Conflicts to Watch in 2024

For CFR’s annual Preventive Priorities Survey, U.S. foreign policy experts assessed the likelihood and impact of thirty potential conflicts that could emerge or escalate in 2024.

Masked members of the far-right group Patriot Front march through Washington, DC, holding American flags and riot shields.

April 3, 2018

Space
Cybersecurity and the New Era of Space Activities

Satellite cybersecurity has received little attention from spacefaring states, despite significant risks.

SpaceX launches a Tesla into space