-
CYBERSECURITYMarket Incentives and Cybersecurity: Fixing the Broken System Before It Breaks Us
Cybersecurity is not just an IT issue; it is a shared responsibility and an economic imperative. Only by ensuring resilience can we confidently adopt new technology and realize its benefits. The next horizon of the cyber security strategy would require a mix of incentives—including regulation, market forces and cultural change—to realize the objective of building a secure and resilient digital economy.
-
-
RESILIENCE Power-Outage Exercises Strengthen the Resilience of U.S. Bases
In recent years, power outages caused by extreme weather or substation attacks have exposed the vulnerability of the electric grid. Now mandated by law, Lincoln Laboratory’s blackout drills are improving national security and ensuring mission readiness.
-
-
CYBERSECURITYComputer Scientists Boost U.S. Cybersecurity
As cyber threats grow more sophisticated by the day, researchers are making computing safer thanks to federally funded research that targets some of the internet’s most pressing security challenges.
-
-
CYBERSECURITYRobustly Detecting Sneaky Cyberattacks That Might Throw AI Spacecraft Off-Course
Cyberattacks on future, AI-guided spacecraft could be thwarted by unpicking what the AI has been “thinking.”
-
-
CYBERSECURITYCybersecurity Training Programs Don't Prevent Employees from Falling for Phishing Scams
Cybersecurity training programs as implemented today by most large companies do little to reduce the risk that employees will fall for phishing scams. Study involving 19,500 UC San Diego Health employees evaluated the effectiveness of two different types of cybersecurity training.
-
-
POLARIZATIONInfluencers, Multipliers, and the Structure of Polarization: How Political Narratives Circulate on Twitter/X
A recent study provides a nuanced understanding of the mechanisms driving polarization and issue alignment on Twitter/X and reveals how political polarization is reinforced and structured by two distinct types of highly active users: influencers and multipliers.
-
-
POWER-GRID PROTECTIONProtecting the Grid with Artificial Intelligence
The electric grid powers everything from traffic lights to pharmacy fridges, but it regularly faces threats from severe storms and advanced attackers. New neural network detects physical issues, cyberattacks.
-
-
EXTREMISMHashtags and Humor Are Used to Spread Extreme Content on Social Media
Conspiracy theories and incitement to harassment and violence abound on mainstream social media platforms like Facebook and Instagram. But the extreme content is often mixed with ironic play, memes and hashtags, which makes it difficult for authorities and media to know how to respond.
-
-
RANSOMWARELarge Language Models Can Execute Complete Ransomware Attacks Autonomously
Study demonstrates AI systems can carry out full attack campaigns, a warning to cybersecurity defenders.
-
-
CYBERSECURITYHow AI Can Ease Workloads for Frontline Cybersecurity Teams
A 10-month trial has shown how large language models can assist cybersecurity analysts during live cyberthreat investigations to boost productivity and trust.
-
-
CYBERSECURITYCodemakers Race to Secure the Internet as Quantum Threat Looms
With quantum computing on the horizon, cryptographers are working to secure digital communications against a new generation of potential threats.
-
-
ELECTION SECURITYVoting from Your Sofa Is Secure Enough – but Will It Be Allowed?
A new electronic voting system developed at NTNU can withstand attacks from quantum computers, meaning digital elections can be conducted securely, even in the future.
-
-
DEEPFAKESAustralia’s Deepfake Dilemma and the Danish Solution
Countries need to move beyond simply pleading with internet platforms for better content moderation and instead implement new legal frameworks that empower citizens directly. For a model of how to achieve this, policymakers should look to the innovative legal thinking emerging from Denmark.
-
-
CHINA WATCHDigital Siege Puts Taiwan’s Resilience to the Test
The most sustained conflict unfolding between China and Taiwan is not taking place on the water or in the air; it is happening in cyberspace.
-
-
AIHow Poisoned Data Can Trick AI − and How to Stop It
The quality of the information that the AI offers depends on the quality of the data it learns from If someone tries to interfere with those systems by tampering with their training data –either the initial data used to build the system or data the system collects as it’s operating to improve –trouble could ensue.
-
More headlines
The long view
EXTREMISMWhat Does Netflix’s Drama “Adolescence” Tell Us About Incels and the Manosphere?
By Lewys Brace
While Netflix’s psychological crime drama ‘Adolescence’ is a work of fiction, its themes offer insight into the very real and troubling rise of the incel and manosphere culture online.
CYBERSECURITYConfronting Core Problems in Cybersecurity
By Sara Frueh
It’s common for governors and mayors to declare a state of emergency and activate the National Guard in the aftermath of hurricanes, tornadoes, and other natural disasters. But last month, officials in Minnesota took these steps in the wake of a major cyberattack on the city of St. Paul —a testament to how disruptive these attacks have become.
ELECTION SECURITYVoting from Your Sofa Is Secure Enough – but Will It Be Allowed?
By Sølvi Normannsen
A new electronic voting system developed at NTNU can withstand attacks from quantum computers, meaning digital elections can be conducted securely, even in the future.