• China Looks to Africa in Race for Lithium

    Electric cars, and other green technologies, are dependent on lithium, and growing demand has caused the prices for lithium to increase by almost 500 percent in the past year. Africa has ample resources of lithium, and China is leading the race to control the continent’s lithium resources.

  • Five Cybersecurity Challenges Beyond Technology

    The data are clear: cyberattacks have been on the rise in recent years and the cybersecurity situation is increasingly complex. More than 90% of cyberattacks are made possible, to a greater or lesser extent, by human error.

  • U.S. Set to Block Most Imports Tied to China's Xinjiang Province

    Later this month, the Biden administration will begin enforcing a new law barring products made with forced labor in China’s Xinjiang province from being imported to the United States. Under the law, U.S. Customs and Border Protection will treat any goods that are made in Xinjiang, either wholly or in part, as the product of forced labor unless the importer can show “clear and convincing evidence” that they are not.

  • China’s Growing Agricultural Problems Pose Risks for the U.S.

    China is facing a growing demand on its agricultural production. The Chinese government has taken several domestic initiatives to address the growing problem, but it has also gone abroad to address its needs through investments and acquisitions of farmland, animal husbandry, agricultural equipment, and intellectual property (IP), particularly of GM seeds These efforts present several risks to U.S. economic and national security.

  • Inside the Government Fiasco That Nearly Closed the U.S. Air System

    The upgrade to 5G was supposed to bring a paradise of speedy wireless. But a chaotic process under the Trump administration, allowed to fester by the Biden administration, turned it into an epic disaster. The problems haven’t been solved.

  • Identifying and Predicting Insider Threats

    Insider threats are one of the top security concerns facing large organizations. Current and former employees, business partners, contractors—anyone with the right level of access to a company’s data—can pose a threat. A new project seeks to detect and predict insider threats.

  • Bad for Computer Security: Employees Returning to the Office

    When employees feel they deserve superior technology compared to other employees—and they don’t receive unrestricted access to it—they pose a security risk to their companies, according to a new research.

  • Faster Ransomware Detection

    Ransomware extortion is hugely expensive, and instances of ransomware extortion are on the rise. The FBI reports receiving 3,729 ransomware complaints in 2021, with costs of more than $49 million. What’s more, 649 of those complaints were from organizations classified as critical infrastructure.

  • Strengthen Advanced Manufacturing for Critical and Emerging Technologies

    NIST has awarded a total of $2.08 million to seven organizations in six states to develop manufacturing technology roadmaps to strengthen U.S. innovation and productivity. Each award will fund projects for up to 18 months to address national priorities such as manufacturing of critical infrastructure, communication, and transformative approaches and technologies in construction.

  • The "Rock-to-Metal Ratio" of Critical Minerals

    A new metric to quantify the amount of waste rock generated by mining for minerals essential to 21st century society has been created by the U.S. Geological Survey and Apple.

  • IBM, Historically Black Colleges Partner to Tackle Cybersecurity Talent Shortage

    In 2020, the talent shortage in the U.S. has more than tripled over ten years, with 69 percent of employers surveyed struggling to fill skilled positions. By September 2021, there were more than 1.2 million U.S. job vacancies postings in software-related professions. IBM joins with Historically Black Colleges & Universities to launch cybersecurity degree programs.

  • AMLO's Lithium Grab and War on Green Energy Will Hurt North America

    Nationalizing Mexico’s lithium reserves and extending state control over electricity and energy will undermine the region’s prosperity and security.

  • Undetected and Dormant: Managing Australia’s Software Security Threat

    At the same time as software has become integral to our prosperity and national security, attacks on software supply chains are on the rise. Software supply chain attacks are popular, can have a big impact and are used to great effect by a range of cyber adversaries.

  • Cornell University Profs Call for School to Halt, Reverse Its Growing Academic, Business Ties with China

    An event at Cornell University, organized by three professors, which called for the university to halt, and then reverse, its growing academic and business ties with China, reflected a broader trend of calls for colleges and universities to cut ties with and divest from Chinese groups linked to human rights abuses.

  • The Future of Nuclear Waste: What’s the Plan and Can It Be Safe?

    The UK is planning to significantly expand its nuclear capability — from approximately 8 gigawatts (GW) today to 24GW by 2050, which would meet around 25% of the forecast UK energy demand — in an effort to decrease its reliance on carbon-based fossil fuels. New reactors will inevitably mean more radioactive waste. Above-ground nuclear waste storage isn’t a feasible long term plan. What are the alternatives?