• Helping Industry Develop Secure Grid Technologies

    Rapid development and deployment of new technologies in the energy delivery systems marketplace make the power grid a hotbed for innovation—and an attractive target for cybercriminals. Cybersecurity researchers are working to change that by building next-generation tools for hardening the power grid—and other critical infrastructure—against attack.

  • Cybersecurity and the Occupation of the Capitol

    On 6 January, a large number of pro-Trump rioters occupied portions of the U.S. Capitol building to protest and disrupt the counting and certification of electoral votes from the November 2020 election. Herb Lin writes that the significance of this event for American democracy, the rule of law, and the depths of extremism in the U.S. populace will be addressed by others, “but I am compelled to point out this siege has created potentially serious cyber risks for Congress and other affected offices.”

  • 5G: New Benefits, Cybersecurity Risks

    5G builds upon existing telecommunication infrastructure to improve bandwidth and capabilities and reduce network-generated delays. However, 5G also carries over and introduces new risks that must be addressed to ensure its secure and safe use by the government and private sectors, including everyday citizens.

  • UWF’s Master’s in Cybersecurity Online Program Ranks among Best Values in Nation

    In only its second year of existence, the University of Florida’s (UWF) nationally designated Master of Science in Cybersecurity online program – recognized as a leading program in cybersecurity education and workforce development — has been ranked as one of the best values in the nation, according to the 2020 Cybersecurity Guide rankings.

  • NSA Grant to Angelo State for Cyber Security Capacity Building Project

    Angelo State University has been awarded a $295,402 grant from the National Security Agency (NSA) to fund the new “ASU Cybersecurity Capacity Building Project” that will expand the cybersecurity program in ASU’s Department of Computer Science.

  • Algorithm Could Quash Abuse of Women on Twitter

    Online abuse targeting women, including threats of harm or sexual violence, has proliferated across all social media platforms, but researchers have developed a statistical model to help drum it out of the Twittersphere.

  • New Detection Method to Protect Army Networks

    U.S. Army researchers developed a novel algorithm to protect networks by allowing for the detection of adversarial actions that can be missed by current analytical methods. The main idea of this research is to build a higher-order network to look for subtle changes in a stream of data that could point to suspicious activity.

  • $26 million NSF initiative to establish new Center for Quantum Networks

    The National Science Foundation (NSF) has launched a major new initiative to establish and lead the Center for Quantum Networks, or CQN. The new center is funded through an initial $26 million, 5-year grant awarded to the University of Arizona, with an additional five-year $24.6 million renewal option.

  • Cybersecurity Research Center to Tackle Growing Cyberthreat

    RMIT University has launched Australia’s first cybersecurity research center which, RMIT says. “takes an industry driven approach to meet the rapidly evolving cyber security challenges in Australia and globally.” The center for Cyber Security Research and Innovation (CSRI) will focus on the organizational, human, and technical aspect of cyber security.

  • China Working to “Develop, Export, and Institutionalize” Digital Authoritarianism: Report

    The Senate Foreign Relations Committee Minority Staff on Tuesday published a new report on China’s digital authoritarianism. “[T]the report is the culmination of a comprehensive Committee investigation into China’s efforts to develop, export, and institutionalize a new, authoritarian governance model for the digital domain,” the report’s authors say. “China is seeking to exploit new and emerging technologies to cultivate digital authoritarianism along multiple paths,” Senator Bob Menendez (D-New Jersey) said. “If successful, China – and not the United States and other like-minded nations – will be writing the future of cyberspace.”

  • Showcasing Cybersecurity Technologies

    Twelve innovative cybersecurity technologies available for commercial licensing from four U.S. Department of Energy national laboratories will be showcased to the public during a series of free webinars starting this month.

  • U.K. Will Not Be Able to Prevent “Misuse of Data” by China if Huawei Deal Goes Ahead: U.S. Ambassador

    Robert Wood Johnson, the U.S. ambassador to the U.K., warned that if the U.K. allowed Huawei access to the U.K. 5G communication infrastructure, there would be no way for the U.K. to prevent Chinese intelligence agencies from misusing the data collected by Huawei in the course of the company’s operations. Experts say that even more worryingly, if Huawei is allowed access to the nascent U.K. 5G infrastructure, the company, with a flip of a switch, could take down the entire U.K. communication system when ordered to do so by the Chinese government.

  • Idaho Team Impresses in Girls Go CyberStart Coding Competition

    It would have been a challenge even in normal times, but a four-girl team from Skyline High School in Idaho Falls overcame quarantine and equipment issues to finish 29th in Girls Go CyberStart, a national online problem solving competition held in late May.

  • UA Little Rock to Offer New Bachelor’s Degree in Cybersecurity

    The University of Arkansas at Little Rock is introducing a new four-year degree program in cybersecurity in the fall 2021 semester to help meet the rising demand for cybersecurity professionals. The university says the new degree program will attract more government and industry jobs to the region, while helping to fill a growing need for more trained cybersecurity professionals.

  • Ensuring Complex Programs Are Bug-Free without Testing

    A team of researchers have devised a way to verify that a class of complex programs is bug-free without the need for traditional software testing. Called Armada, the system makes use of a technique called formal verification to prove whether a piece of software will output what it’s supposed to. It targets software that runs using concurrent execution, a widespread method for boosting performance, which has long been a particularly challenging feature to apply this technique to.