• Is China’s Huawei a Threat to U.S. National Security?

    The Chinese telecommunications company, a world leader in 5G technology and smartphones, faces accusations that the Chinese intelligence services can use – and have used — its 5G infrastructure for espionage. The U.S. and other Western countries have effectively banned Huawei from building their 5G networks, but it remains popular in low-income countries. The outcome of the struggle could shape the world’s tech landscape for years to come.

  • Grant to Support High-Potential Computer Science Students

    The University of Texas at El Paso received a $5 million grant from the National Science Foundation (NSF) to provide financial support and professional development experiences to talented students in the field of computer science.

  • $4.8M to Address National Cybersecurity Workforce Shortage

    Oregon State University has received $4.8 million from the National Science Foundation to help the United States close a big gap between the number of cybersecurity job openings and the number of qualified applicants for those positions.

  • Nextgen Cybersecurity: A 5G-Enabled AI-Based Malware Classification System

    Researchers develop a 5G-enabled deep learning approach for classifying malware attacks on the Industrial Internet of Things.

  • Cybersecurity Professionals May Be Burning Out at a Faster Rate Than Frontline Health Care

    More attention should be paid to the fast rate of burn-out among cybersecurity professionals. Hundreds of thousands of cybersecurity jobs are vacant owing to lack of cybersecurity talent – and that number is growing, among other things, by thousands of cybersecurity professionals who leave the field after a few short years.

  • DHS Unveils New Cybersecurity Performance Goals for Critical Infrastructure

    DHS released the Cybersecurity Performance Goals (CPGs), voluntary practices that outline the highest-priority baseline measures businesses and critical infrastructure owners of all sizes can take to protect themselves against cyber threats.

  • Ensuring Our Workforce Is Cyber Ready

    Remaining vigilant and prepared to protect our nation’s cybersecurity is one of DHS S&T’s highest priorities. To meet this goal, S&T is harnessing the intellectual power of America’s universities and leveraging some of the best and brightest subject matter experts and academic minds via S&T Centers of Excellence (COE).

  • NYU to Create Comprehensive Cybersecurity and Resiliency Program

    The quantity, velocity and variety of cybersecurity attacks worldwide reflect the proliferation of connected devices, advances in extended reality systems, AI, telecommunications, and global supply chains powered by the Internet. At the same time, there is a shortfall of cybersecurity and resiliency experts with real-world training and immersion in cutting-edge research and technology to face these challenges.

  • What Would It Take to Survive an EMP Attack?

    We are increasingly vulnerable to both natural disruptions and military attacks on our power grids. An electromagnetic pulse impulses (EMPs) would destroy your electronics, leaving you and your surroundings intact — but without easy means of survival. Remember, almost all conventional power sources and the entire internet would be knocked out and might take many months to replace.

  • Protecting National Public Warning System from EMPs

    DHS released a report of operational approaches to protect the National Public Warning System from an electromagnetic pulse (EMP). The report summarizes recommendations that federal, state, local agencies, and private sector critical infrastructure owners and operators can employ to protect against the effects of an EMP event.

  • Former U.S. Cyber Command and NSA Chief Makes the Case for a Cyber Competition Strategy

    Former U.S. National Security Agency and U.S. Cyber Command boss Mike Rogers asks: “What is our vision of the key technologies, the most critical sectors that are really going to drive economic advantage … and [that] if placed at risk would cause us harm, [and] what are the policies we need to create advantage for ourselves?” A new cybersecurity strategy based on what is required to become and remain competitive, secure and resilient should focus on this central question.

  • Artificial Intelligence Isn’t That Intelligent

    In the world of information security, social engineering is the game of manipulating people into divulging information that can be used in a cyberattack or scam. Cyber experts may therefore be excused for assuming that AI might display some human-like level of intelligence that makes it difficult to hack. Unfortunately, it’s not. It’s actually very easy.

  • FAU Receives State Grant for Cybersecurity, IT Training

    Cybersecurity jobs are expected to grow by a faster-than-average 33 percent over the next 10 years. In addition, cybersecurity-related job postings have increased by 43 percent in the past year. Florida launches a $15.6 million initiative to prepare students and mid-career professionals for jobs in the fields of cybersecurity and information technology.

  • Confronting Reality in Cyberspace: Foreign Policy for a Fragmented Internet

    The global internet—a vast matrix of telecommunications, fiber optics, and satellite networks—is in large part a creation of the United States. Moreover, U.S. strategic, economic, political, and foreign policy interests were served by the global, open internet. The United States now confronts a starkly different reality. The utopian vision of an open, reliable, and secure global network has not been achieved and is unlikely ever to be realized. Today, the internet is less free, more fragmented, and less secure.

  • The Strategic Relevance of Cybersecurity Skills

    Evidence suggests there is a global cybersecurity skills shortage affecting businesses and governments alike, which means that organizations are struggling to fill their cybersecurity vacancies. Tommaso De Zan writes that “the absence of cybersecurity experts protecting national critical infrastructures constitutes a national security threat, a loophole that may be exploited by malicious actors.”