Institute for Cyber Law, Policy, and Security

Person's hand placing a ballot in a slot in a voting box

New Pitt Cyber Analysis Created to Guide Statewide Voting Security Efforts

The Pitt Institute for Cyber Law, Policy, and Security's latest effort — maps and analysis of voting machine purchases in Pennsylvania — aims to steer counties that still need to buy new systems toward the safest and most secure option.
gate in the Cathedral

Pitt Cyber Announces New Affiliates

an "I Voted" sticker that's broken into pieces on top of a background of 1s and 0s

Election Security Commission Releases Study and Recommendations

The Blue Ribbon Commission on Pennsylvania’s Election Security, co-chaired by Pitt Cyber’s David Hickton, urges the state to issue bonds, require audits and create emergency plans to protect elections.
woman walking into a brick polling place building with a VOTE HERE sandwich board outside

Pitt Cyber Expert Discusses Security, Integrity Concerns Ahead of Upcoming Elections

Voter-verifiable paper ballots and changes to the voter registration process were among the recommendations Pitt’s David Hickton recently offered to the Pennsylvania House and Senate.
Hickton smiling

Advanced CyberCamp Prepares the Next Generation for Cyber Workforce

The second annual Air Force Association CyberCamp immersed 250 high schoolers in activities to identify malicious code, check for hackers and defend simulated network systems.
Mark Nordenberg speaking at microphone

Pitt Task Force Outlines Framework for Confronting Nationwide Opioid Crisis

Pitt is taking a leading role in tackling the public health crisis by strengthening its prevention, treatment and recovery programs to bring meaningful change to the lives of students.
Six staff members of Cyber Institute standing in posed group portrait.

Cyber Experts Making Cloud Security Easier

Protecting personal or work data stored in the cloud takes more technical effort and time than most average users are willing to spend. But Pitt researchers are working on simplifying the process, with the ultimate goal of putting cloud security into users’ hands.