• TECH SECURITYBuilding Trust into Tech: A Framework for Sovereign Resilience

    By Jason Van der Schyff and James Corera

    Governments are facing a critical question: who can be trusted to build and manage their countries’ most sensitive systems? Vendor choices, for everything from cloud infrastructure to identity platforms, are no longer just commercial; they are strategic.

  • CHINA WATCHU.S.–China Cyber Relations and the Weaponization of Microsoft Platforms

    By Ishanya Sharma

    Cyber tensions between the United States and China show Microsoft’s central yet fragile role in global cybersecurity, where its platforms serve as both assets and targets. While both nations have exploited vulnerabilities within the platform to conduct cyber-espionage against each other, China has been particularly persistent in its operations.

  • CYBERSECURITYStudy Finds Smarter Way to Train Employees to Thwart Phishing Scams

    Companies often send out simulated—or fake—phishing emails to employees to see who takes the bait and click. Those who fall for such scams typically receive an on-the-spot lesson meant to help them recognize suspicious messages the next time. But new research finds that approach might not be the best way to help employees learn from their mistakes.

  • CRITICAL INFRASTRUCTUREThe Invisible Siege: Securing the Indo-Pacific’s Telecom Backbone

    By James Corera and Jason Van der Schyff

    Telecommunications once seemed like the passive layer of critical infrastructure—pipes and switches that connected everything yet rarely drew attention. That perception ended long ago. The stability of countries will depend on whether they can keep the lights on and the lines open when pressure comes.

  • CYBERSECURITYHow Secure Is Video Conferences—Really?

    Since the COVID-19 pandemic, video conferencing platforms like Zoom and Microsoft Teams have become essential for work, education, and social connections. While these platforms offer controls such as disabling cameras and muting microphones to safeguard user privacy, a new study suggests that video conferencing may not be as secure as many assume.

  • CYBERSECURITYRemote Work Has Opened Australia’s Cyber Backdoor

    By Isaac Sharp

    The choice is stark. Either we treat remote-work infiltration as a national security priority now, or hostile operatives will continue slipping into networks under the cover of legitimate employment. By modernizing vetting, tightening oversight and raising awareness, we can turn the remote workforce from a vulnerability into a frontline defense.

  • SURVEILLANCEThe Spy Who Came in from the Wi-Fi: Beware of Radio Network Surveillance

    New technology is able to infer the identity of persons with no WiFi device on them through signals in radio networks. Researchers warn of risks to privacy and call for protective measures.

  • CYBERSECURITYMultitasking Raises Risk of Phishing

    By Michael Parker

    In the information age, multitasking is often worn as a badge of honor. But according to new research, multitasking may also blind us to hidden threats, thereby increasing our chances of falling victim to cybercrime.

  • CYBERSECURITYMarket Incentives and Cybersecurity: Fixing the Broken System Before It Breaks Us

    By Rajiv Shah and Debi Ashenden

    Cybersecurity is not just an IT issue; it is a shared responsibility and an economic imperative. Only by ensuring resilience can we confidently adopt new technology and realize its benefits. The next horizon of the cyber security strategy would require a mix of incentives—including regulation, market forces and cultural change—to realize the objective of building a secure and resilient digital economy.

  • RESILIENCE Power-Outage Exercises Strengthen the Resilience of U.S. Bases

    By Kylie Foy

    In recent years, power outages caused by extreme weather or substation attacks have exposed the vulnerability of the electric grid. Now mandated by law, Lincoln Laboratory’s blackout drills are improving national security and ensuring mission readiness.

  • CYBERSECURITYComputer Scientists Boost U.S. Cybersecurity

    By David Danelski

    As cyber threats grow more sophisticated by the day, researchers are making computing safer thanks to federally funded research that targets some of the internet’s most pressing security challenges.

  • CYBERSECURITYRobustly Detecting Sneaky Cyberattacks That Might Throw AI Spacecraft Off-Course

    By Shamim Quadir

    Cyberattacks on future, AI-guided spacecraft could be thwarted by unpicking what the AI has been “thinking.”

  • CYBERSECURITYCybersecurity Training Programs Don't Prevent Employees from Falling for Phishing Scams

    By Ioana Patringenaru

    Cybersecurity training programs as implemented today by most large companies do little to reduce the risk that employees will fall for phishing scams. Study involving 19,500 UC San Diego Health employees evaluated the effectiveness of two different types of cybersecurity training.

  • POWER-GRID PROTECTIONProtecting the Grid with Artificial Intelligence

    The electric grid powers everything from traffic lights to pharmacy fridges, but it regularly faces threats from severe storms and advanced attackers. New neural network detects physical issues, cyberattacks.

  • RANSOMWARELarge Language Models Can Execute Complete Ransomware Attacks Autonomously

    Study demonstrates AI systems can carry out full attack campaigns, a warning to cybersecurity defenders.