5G: A Guide to Secure Adoption By Business assesses security challenges introduced by 5G technology and recommends methods for mitigating them in the private sector.

More Publications

AUKUSPillar2 EB

AUKUS Pillar 2 Defense Cooperation: Where are We and What Do We Hope to Achieve?

The AUKUS agreement concluded by Australia, the United Kingdom, and the United States will be three years old next month. Its more well-known centerpiece is Pillar 1, creating a decades-long…

Cyber Insurance Graphic Website

A Public-Private Partnership Approach to a Federal Cyber-Insurance Backstop

When Congress ultimately considers the prospect of establishing a federal insurance backstop for catastrophic cyber-attacks, it should create a public-private partnership modeled on the UK’s Pool Re program that relies…

Gen AI Cover

Adopting Generative AI: Pathways for Defense

Like the private sector and other organizations striving to improve efficiency and effectiveness, the Department of Defense (DoD) has increasingly embraced generative AI. These advanced systems, capable of creating new…

Receive BENS news and insights in your inbox.