-
How Chinese Companies Are Challenging National Security Decisions That Could Delay 5G Network Rollout
In many countries, governments have decided to block Chinese companies from participating in building communication infrastructure in their countries because of national security concerns. Chinese companies and investors often refuse to take such national security changes lying down. With varying degrees of success, firms have mounted a range of formal and informal challenges in recent years.
-
-
Cybersecurity Defense Software Put Through the Wringer at NATO’s Cyber Coalition 2022
How might artificial intelligence help NATO allies protect information technology systems, power grids, and other assets?
-
-
New Method Tracks Groups of Anomalous Users
Malicious or fictitious users on internet networks have become the bane of the internet’s existence. Many bemoan the increasing presence of such users, but few have developed methods to track and expose them. Until now.
-
-
$4.8M to Address National Cybersecurity Workforce Shortage
Oregon State University has received $4.8 million from the National Science Foundation to help the United States close a big gap between the number of cybersecurity job openings and the number of qualified applicants for those positions.
-
-
Revised Guidelines for Digital Identification in Federal Systems
NIST’s draft publication features updates intended to help fight online crime, preserve privacy and promote equity and usability.
-
-
Protecting DoD Microelectronics from Adversary Influence
The NSA publicly released four Cybersecurity Technical Reports to help the Department of Defense protect field-programmable gate array (FPGA)-based systems from adversary influence.
-
-
Testing Environments Help Secure Transportation Infrastructure
“All critical infrastructure sectors—including the energy, manufacturing, and transportation sectors—rely heavily on sophisticated technologies like industrial control systems, cellular networks, and artificial intelligence,” said DHS S&T’s Alex Karr. “These are all accessed, monitored, and controlled via the internet, which, in turn, makes them susceptible to hacking, malware attacks, and other malicious activities.”
-
-
Content Moderation Sacrificed in Left-Right Deals on Tech Reform
With time running out on the lame-duck Congress, tech reformers are pushing for votes on a package of bills that stalled over the summer. Three bills—the American Innovation and Choice Online Act (AICOA), the Open App Markets Act (OAMA), and the Journalism Competition and Preservation Act (JCPA)—would write special competition rules for large tech companies in ways that could fundamentally change how tech platforms moderate content like hate speech, disinformation, and incitement to violence.
-
-
Smart AI Tools Could Protect Social Media Users’ Privacy
Digital assistants could help prevent users from unknowingly revealing their views on social, political and religious issues by fighting AI with AI, researchers say.
-
-
New ‘Faraday Cage’ Research Facility to Help Combat Digital Crime
University of Huddersfield installing a new facility named the ‘Faraday Cage’ which will help speed-up the development and testing of new digital forensic processes to help law enforcement meet the huge growth rate in digital crime.
-
-
Major Global Security Challenges
What are the major threats the world is facing? Researchers highlight five such threats: The growing role of disinformation; attacks on the idea of democracy; environmental challenges; economic instability; and terrorism – both domestic and foreign.
-
-
Mathematics Works in Serendipitous Ways
In the digital era and moving towards quantum computing, protecting data against hack attacks is one of our biggest challenges. Mathematical theorem used to crack U.S. government encryption algorithm.
-
-
Smart Inverters’ Vulnerability to Cyberattacks Needs to Be Identified and Countered
A survey of threats to microgrids from small power sources can help security experts develop solutions.
-
-
Consumers Feel Left Out of Debates on Cyberattacks and Data Security
Illegal cyberattacks on thousands of citizens’ personal data in Australia have heightened awareness of the hazards of insecure digital systems, – and consumers want to play a more active role in building more resilient systems to reduce risks caused by hacking, online deception, bots and other threats.Illegal cyberattacks on thousands of citizens’ personal data in Australia have heightened awareness of the hazards of insecure digital systems, – and consumers want to play a more active role in building more resilient systems to reduce risks caused by hacking, online deception, bots and other threats.
-
-
Top Prosecutors in CA, NY and DC Are Speaking Up for End-to-End Encryption
We all should have the ability to have a private conversation, and it follows that we need ways to communicate privately online as well. In the digital world, end-to-end encryption is our best chance to maintain our privacy and security.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.