As every sector of the global economy and nearly every facet of modern society undergo digital transformation, ITIF advocates for policies that spur not just the development of IT innovations, but more importantly their adoption and use throughout the economy. In the area of cybersecurity, ITIF studies how governments and the private sector can improve the security and resiliency of computers and networks.
Publications and Events
December 14, 2022|Events
Malvertising: How Piracy Sites Use Malicious Ads to Infect Consumer Devices With Malware
Join ITIF for a panel discussion about the threat that malware in ads on piracy sites poses to consumers, the implications of these malicious ads for cybersecurity, and how the public and private sectors can address this issue. Senator Thom Tillis (R-NC), Co-Chair of the Senate Cybersecurity Caucus, will provide keynote remarks.
December 8, 2022|Events
How Should the FTC Address Deceptive Endorsement Advertising Online?
Join the Center for Data Innovation for a panel discussion on the future of the Endorsement Guides and how platforms and policymakers can work together to protect consumers, promote innovation, and improve advertising online.
November 23, 2022|Testimonies & Filings
Coalition Letter to Parliament: Fix Online Safety Bill to Not Undermine Encryption
A coalition of 70 individuals and organizations, including the Center for Data Innovation, sent an open letter to the United Kingdom’s Prime Minister Rishi Sunak opposing the Online Safety Bill’s clauses that erode end-to-end encryption in private messaging and other online services.
November 16, 2022|Presentations
Are You Prepared for the Cyber Resilience Act?
Kir Nuthi provides an overview of the Cyber Resilience Act and its scope, highlighting key compliance challenges and the regulation's effects on businesses and start-ups.
November 14, 2022|Events
The Costs and Benefits of Security-by-Design in the Cyber Resilience Act
Watch the webinar where ITIF's Center for Data Innovation lead a discussion on the Cyber Resilience Act, the basics of security-by-design, and whether a security-by-design approach will effectively tackle future cybersecurity risks.
November 14, 2022|Reports & Briefings
The Effect of International Proposals for Monitoring Obligations on End-To-End Encryption
European and U.S. policymakers have proposed imposing monitoring obligations on Internet intermediaries to improve online safety. Despite their best efforts, these proposals risk undermining users’ privacy by eliminating the use of end-to-end encryption. Therefore, policymakers should not pursue them.
July 7, 2022|Blogs
NIST Takes First Big Step in Preparing for Post-Quantum Cryptography
In order to remain a world leader in information technology and mitigate any potential risks associated with emerging technologies, the U.S. government should scale up its investment in quantum computing applications, particularly near-term applications.
June 30, 2022|Testimonies & Filings
Comments to Australia’s Department of the Prime Minister and Cabinet Regarding the National Data Security Action Plan
Including data localization in its National Data Strategy would be a critical misstep that would undermine what Australia is otherwise working to achieve at home and globally in terms of digital policy.
May 24, 2022|Testimonies & Filings
Comments to the European Commission on the Cyber Resilience Act Initiative
The Commission should avoid maintaining the status quo or pursuing broad horizontal regulation.
May 6, 2022|Testimonies & Filings
Comments to the SEC Regarding Its Proposed Rule on Cybersecurity Risk Management, Strategy, Governance, and Incidence Disclosure
ITIF supports SEC’s efforts to ensure publicly traded companies disclose relevant information on their cybersecurity practices and material cybersecurity incidents, which would enable investors to make more informed decisions, in line with existing SEC disclosure requirements. This type of transparency will not only help investors make more informed decisions, but it should also incentivize companies to adopt cybersecurity best practices.