ITIF Search


As every sector of the global economy and nearly every facet of modern society undergo digital transformation, ITIF advocates for policies that spur not just the development of IT innovations, but more importantly their adoption and use throughout the economy. In the area of cybersecurity, ITIF studies how governments and the private sector can improve the security and resiliency of computers and networks.


Publications and Events

December 14, 2022|Events

Malvertising: How Piracy Sites Use Malicious Ads to Infect Consumer Devices With Malware

Join ITIF for a panel discussion about the threat that malware in ads on piracy sites poses to consumers, the implications of these malicious ads for cybersecurity, and how the public and private sectors can address this issue. Senator Thom Tillis (R-NC), Co-Chair of the Senate Cybersecurity Caucus, will provide keynote remarks.

December 8, 2022|Events

How Should the FTC Address Deceptive Endorsement Advertising Online?

Join the Center for Data Innovation for a panel discussion on the future of the Endorsement Guides and how platforms and policymakers can work together to protect consumers, promote innovation, and improve advertising online.

November 23, 2022|Testimonies & Filings

Coalition Letter to Parliament: Fix Online Safety Bill to Not Undermine Encryption

A coalition of 70 individuals and organizations, including the Center for Data Innovation, sent an open letter to the United Kingdom’s Prime Minister Rishi Sunak opposing the Online Safety Bill’s clauses that erode end-to-end encryption in private messaging and other online services.

November 16, 2022|Presentations

Are You Prepared for the Cyber Resilience Act?

Kir Nuthi provides an overview of the Cyber Resilience Act and its scope, highlighting key compliance challenges and the regulation's effects on businesses and start-ups.

November 14, 2022|Events

The Costs and Benefits of Security-by-Design in the Cyber Resilience Act

Watch the webinar where ITIF's Center for Data Innovation lead a discussion on the Cyber Resilience Act, the basics of security-by-design, and whether a security-by-design approach will effectively tackle future cybersecurity risks.

November 14, 2022|Reports & Briefings

The Effect of International Proposals for Monitoring Obligations on End-To-End Encryption

European and U.S. policymakers have proposed imposing monitoring obligations on Internet intermediaries to improve online safety. Despite their best efforts, these proposals risk undermining users’ privacy by eliminating the use of end-to-end encryption. Therefore, policymakers should not pursue them.

July 7, 2022|Blogs

NIST Takes First Big Step in Preparing for Post-Quantum Cryptography

In order to remain a world leader in information technology and mitigate any potential risks associated with emerging technologies, the U.S. government should scale up its investment in quantum computing applications, particularly near-term applications.

June 30, 2022|Testimonies & Filings

Comments to Australia’s Department of the Prime Minister and Cabinet Regarding the National Data Security Action Plan

Including data localization in its National Data Strategy would be a critical misstep that would undermine what Australia is otherwise working to achieve at home and globally in terms of digital policy.

May 24, 2022|Testimonies & Filings

Comments to the European Commission on the Cyber Resilience Act Initiative

The Commission should avoid maintaining the status quo or pursuing broad horizontal regulation.

May 6, 2022|Testimonies & Filings

Comments to the SEC Regarding Its Proposed Rule on Cybersecurity Risk Management, Strategy, Governance, and Incidence Disclosure

ITIF supports SEC’s efforts to ensure publicly traded companies disclose relevant information on their cybersecurity practices and material cybersecurity incidents, which would enable investors to make more informed decisions, in line with existing SEC disclosure requirements. This type of transparency will not only help investors make more informed decisions, but it should also incentivize companies to adopt cybersecurity best practices.

Back to Top