-
TECH SECURITYBuilding Trust into Tech: A Framework for Sovereign Resilience
Governments are facing a critical question: who can be trusted to build and manage their countries’ most sensitive systems? Vendor choices, for everything from cloud infrastructure to identity platforms, are no longer just commercial; they are strategic.
-
-
CHINA WATCHU.S.–China Cyber Relations and the Weaponization of Microsoft Platforms
Cyber tensions between the United States and China show Microsoft’s central yet fragile role in global cybersecurity, where its platforms serve as both assets and targets. While both nations have exploited vulnerabilities within the platform to conduct cyber-espionage against each other, China has been particularly persistent in its operations.
-
-
CYBERSECURITYStudy Finds Smarter Way to Train Employees to Thwart Phishing Scams
Companies often send out simulated—or fake—phishing emails to employees to see who takes the bait and click. Those who fall for such scams typically receive an on-the-spot lesson meant to help them recognize suspicious messages the next time. But new research finds that approach might not be the best way to help employees learn from their mistakes.
-
-
CRITICAL INFRASTRUCTUREThe Invisible Siege: Securing the Indo-Pacific’s Telecom Backbone
Telecommunications once seemed like the passive layer of critical infrastructure—pipes and switches that connected everything yet rarely drew attention. That perception ended long ago. The stability of countries will depend on whether they can keep the lights on and the lines open when pressure comes.
-
-
CYBERSECURITYHow Secure Is Video Conferences—Really?
Since the COVID-19 pandemic, video conferencing platforms like Zoom and Microsoft Teams have become essential for work, education, and social connections. While these platforms offer controls such as disabling cameras and muting microphones to safeguard user privacy, a new study suggests that video conferencing may not be as secure as many assume.
-
-
CYBERSECURITYRemote Work Has Opened Australia’s Cyber Backdoor
The choice is stark. Either we treat remote-work infiltration as a national security priority now, or hostile operatives will continue slipping into networks under the cover of legitimate employment. By modernizing vetting, tightening oversight and raising awareness, we can turn the remote workforce from a vulnerability into a frontline defense.
-
-
SURVEILLANCEThe Spy Who Came in from the Wi-Fi: Beware of Radio Network Surveillance
New technology is able to infer the identity of persons with no WiFi device on them through signals in radio networks. Researchers warn of risks to privacy and call for protective measures.
-
-
CYBERSECURITYMultitasking Raises Risk of Phishing
In the information age, multitasking is often worn as a badge of honor. But according to new research, multitasking may also blind us to hidden threats, thereby increasing our chances of falling victim to cybercrime.
-
-
CYBERSECURITYMarket Incentives and Cybersecurity: Fixing the Broken System Before It Breaks Us
Cybersecurity is not just an IT issue; it is a shared responsibility and an economic imperative. Only by ensuring resilience can we confidently adopt new technology and realize its benefits. The next horizon of the cyber security strategy would require a mix of incentives—including regulation, market forces and cultural change—to realize the objective of building a secure and resilient digital economy.
-
-
RESILIENCE Power-Outage Exercises Strengthen the Resilience of U.S. Bases
In recent years, power outages caused by extreme weather or substation attacks have exposed the vulnerability of the electric grid. Now mandated by law, Lincoln Laboratory’s blackout drills are improving national security and ensuring mission readiness.
-
-
CYBERSECURITYComputer Scientists Boost U.S. Cybersecurity
As cyber threats grow more sophisticated by the day, researchers are making computing safer thanks to federally funded research that targets some of the internet’s most pressing security challenges.
-
-
CYBERSECURITYRobustly Detecting Sneaky Cyberattacks That Might Throw AI Spacecraft Off-Course
Cyberattacks on future, AI-guided spacecraft could be thwarted by unpicking what the AI has been “thinking.”
-
-
CYBERSECURITYCybersecurity Training Programs Don't Prevent Employees from Falling for Phishing Scams
Cybersecurity training programs as implemented today by most large companies do little to reduce the risk that employees will fall for phishing scams. Study involving 19,500 UC San Diego Health employees evaluated the effectiveness of two different types of cybersecurity training.
-
-
POWER-GRID PROTECTIONProtecting the Grid with Artificial Intelligence
The electric grid powers everything from traffic lights to pharmacy fridges, but it regularly faces threats from severe storms and advanced attackers. New neural network detects physical issues, cyberattacks.
-
-
RANSOMWARELarge Language Models Can Execute Complete Ransomware Attacks Autonomously
Study demonstrates AI systems can carry out full attack campaigns, a warning to cybersecurity defenders.
-
More headlines
The long view
CYBERSECURITYComputer Scientists Boost U.S. Cybersecurity
By David Danelski
As cyber threats grow more sophisticated by the day, researchers are making computing safer thanks to federally funded research that targets some of the internet’s most pressing security challenges.
