Journal of Cyber Policy Curates Its 1000th Cyber Security Research Report

Cyber security research center offers searchable database of cyber security research reports and industry surveys

Journal of Cyber Policy, the cyber security industry blog, announced today that its cyber security research center has now curated over 1,000 cyber security research reports. The site has been indexing industry research reports and surveys for over a year, covering a wide variety of cyber security research topics. These include projections of market size, sorted by sectors like encryption and endpoint detection, as well as surveys of industry professionals on topics such as employee burnout and insider risk.

“We’re excited to reach this milestone,” said Hugh Taylor, Executive Editor of Journal of Cyber Policy. “The depth and breadth of research being produced by members of the cyber security industry is truly impressive.” The site offers links to free research as well as paid reports from professional research agencies.

The Journal’s cybersecurity research center is intended to provide any interested person with cyber security facts. Searchable by topic, it deals with the pressing questions that cybersecurity professionals are grappling with today, such as “What are the most common cyber threats today?” and “What are the most recent statistics on cyber threats?”

Taylor used the cyber security research archive himself in the process of writing his new book Digital Downfall: Technology, Cyber Attacks and the End of the American Republic. The book explores the political vulnerabilities affecting the United States due to its reliance on insecure technology to runs its economy and government.

About Journal of Cyber Policy
The Journal of Cyber Policy, launched in 2018, connects corporate information security policies, regulations government privacy, law enforcement, legislation, government cybersecurity policies and national cyber defenses. It features conversations with thought leaders from across the technology spectrum regarding what Cyber Policy should embody and how it should be developed.

Contact Info:
Name: Hugh Taylor
Email: Send Email
Organization: Journal of Cyber Policy

Release ID: 88969265