-
QUANTUM COMPUTING & ENCRYPTIONDecrypting Tomorrow’s Threats: Critical Infrastructure Needs Post-Quantum Protection Today
Some argue we still have time, since quantum computing capable of breaking today’s encryption is a decade or more away. But breakthrough capabilities, especially in domains tied to strategic advantage, rarely follow predictable timelines. The time to act on the quantum computing threat was yesterday. The next best time is now.
-
-
QUANTUM COMPUTING & ENCRYPTIONQuantum Computing - How it Changes Encryption as We Know It
All of the current encryption standards were created without the consideration of quantum computing and its capabilities. Classical computing would take thousands of years, or more, to crack encryption standards such as RSA or ECC. Quantum computing has the potential to break RSA and ECC encryption within hours or even minutes. AES encryption remains the most secure standard currently in use, but quantum computers will crack it in a fraction of the time that classical computers can.
-
-
CYBERSECURITYNeed for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.
-
-
CYBERSECURITYTrump Is Shifting Cybersecurity to the States, but Many Aren’t Prepared
President Donald Trump recently signed an executive order which substantially reduced the role of the federal government in securing elections, health care, and critical infrastructure against cyberattacks by state actors and cybercriminals. The responsibility of for protection has been shifyed to states and localities, but only 22 of 48 states in a Nationwide Cybersecurity Review met recommended security levels. Moreover, Trump’s funding cuts will make it more difficult for states to bolster their cyber defenses.
-
-
DATA PROTECTIONProtecting Americans’ Sensitive Data from Foreign Adversaries
Last week DOJ took steps to move forward with implementing a program to prevent China, Russia, Iran, and other foreign adversaries from using commercial activities to access and exploit U.S. government-related data and Americans’ sensitive personal data to commit espionage and economic espionage, conduct surveillance and counterintelligence activities, and otherwise undermine our national security.
-
-
AILatest Reasoning Models from OpenAI to Be Used for Energy and National Security Applications on Los Alamos’s Venado Supercomputer
Los Alamos National Laboratory has entered a partnership with OpenAI to install its latest o-series models — capable of expert reasoning for a broad span of complex scientific problems — on the Lab’s Venado supercomputer.
-
-
CYBERSECURITYExperts Explain Signal, Cybersecurity, and How a Journalist Was Sent High-Level Military Intelligence
“The practice of not using SCIFs (Secure Compartmented Information Facilities) for the planning and implementation of conflict with a foreign state is an egregious breach of national security protocols,” said Virginia Tech’s cybersecurity expert Aron Brantly. “That the principals group was using this as a means of communications is a profound violation of US classification laws and standards and constitutes a grave threat to U.S. national security.”
-
-
ENCRYPTIONEncryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
-
-
CYBERSECURITYIsraeli Startup Raises $50m to Stop App-Based Cyberattacks
Oligo Security’s platform allows for quick identification of vulnerabilities in cloud-native software before they are exploited by third parties.
-
-
CYBERSECURITYStandardized Security Playbooks Improve Protection Against Cyberattacks
Each company relies on its own security concepts and devises its playbooks individually. This means hardly any security-related information is shared between these organizations. And that is a problem, especially when business partners regularly exchange data, as is the case with industrial firms and their suppliers.
-
-
ENCRYPTIONA Win for Encryption: France Rejects Backdoor Mandate
In a moment of clarity after initially moving forward a deeply flawed piece of legislation, the French National Assembly has done the right thing: it rejected a dangerous proposal that would have gutted end-to-end encryption in the name of fighting drug trafficking.
-
-
CLOUD SECURITYSecurity Scheme Could Protect Sensitive Data During Cloud Computation
MIT researchers crafted a new approach that could allow anyone to run operations on encrypted data without decrypting it first.
-
-
CHINA WATCHSouth Korea Has Acted Decisively on DeepSeek. Other Countries Must Stop Hesitating
South Korea has suspended new downloads of DeepSeek, and it was right to do so. Chinese tech firms operate under the shadow of state influence, misusing data for surveillance and geopolitical advantage. Any country that values its data and sovereignty must watch this national security threat and take note of South Korea’s response.
-
-
EXTREMISMThe Rise and Fall of Terrorgram: Inside a Global Online Hate Network
White supremacists from around the world used Telegram to spread hateful content promoting murder and destruction in a community they called Terrorgram. ProPublica and FRONTLINE identified 35 crimes linked to Terrorgram, including bomb plots, stabbings, and shootings. After several arrests of alleged Terrorgram members and reforms by Telegram, experts expect that extremists will find a new platform for their hate.
-
-
TERRORISMHow a Global Online Network of White Supremacists Groomed a Teen to Kill
Neo-Nazi influencers on the social media platform Telegram created a network of chats and channels where they stoked racist, antisemitic and homophobic hate. The influencers, known as the Terrorgram Collective, targeted a teen in Slovakia and groomed him for three years to kill.
-
More headlines
The long view
CYBERSECURITYResearchers Calculate Cyberattack Risk for All 50 States
By John Tucker
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.