-
HARDWARE SECURITYCircuit Boards Must Be Trusted. So We’d Better Make Them in Australia
While national security debates have focused on chips and microelectronics, the role of printed circuit board (PCBs) in underpinning system trust has gone largely unexamined. In today’s contested environment, that carries strategic consequences.
-
-
CHINA WATCHIt’s Not Just Software. Physical Critical Equipment Can’t Be Trusted, Either
Just auditing the software in critical equipment isn’t enough. We must assume that adversaries, especially China, will also exploit the hardware if they can.
-
-
RANSOMWRERansomware Drives U.S. Health Data Breaches
Ransomware attacks — which involve a hacker putting encryption controls into a file and then demanding a ransom to unlock the files—have become the primary driver of health care data breaches in the United States, compromising 285 million patient records over 15 years.
-
-
DATA PROTECTIONHow We Think About Protecting Data
A new study shows public views on data privacy vary according to how the data are used, who benefits, and other conditions.
-
-
WATER SECURITYProtecting Florida’s Water Infrastructure from Cyber Threats
INL and the state of Florida are collaborating on an innovative cybersecurity initiative aimed at protecting Florida’s water infrastructure from cyber threats.
-
-
CYBERSECURITYNeed for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.
-
-
CYBERSECURITYTrump Is Shifting Cybersecurity to the States, but Many Aren’t Prepared
President Donald Trump recently signed an executive order which substantially reduced the role of the federal government in securing elections, health care, and critical infrastructure against cyberattacks by state actors and cybercriminals. The responsibility of for protection has been shifyed to states and localities, but only 22 of 48 states in a Nationwide Cybersecurity Review met recommended security levels. Moreover, Trump’s funding cuts will make it more difficult for states to bolster their cyber defenses.
-
-
DATA PROTECTIONProtecting Americans’ Sensitive Data from Foreign Adversaries
Last week DOJ took steps to move forward with implementing a program to prevent China, Russia, Iran, and other foreign adversaries from using commercial activities to access and exploit U.S. government-related data and Americans’ sensitive personal data to commit espionage and economic espionage, conduct surveillance and counterintelligence activities, and otherwise undermine our national security.
-
-
CYBERSECURITYIsraeli Startup Raises $50m to Stop App-Based Cyberattacks
Oligo Security’s platform allows for quick identification of vulnerabilities in cloud-native software before they are exploited by third parties.
-
-
CYBERSECURITYStandardized Security Playbooks Improve Protection Against Cyberattacks
Each company relies on its own security concepts and devises its playbooks individually. This means hardly any security-related information is shared between these organizations. And that is a problem, especially when business partners regularly exchange data, as is the case with industrial firms and their suppliers.
-
-
CLOUD SECURITYSecurity Scheme Could Protect Sensitive Data During Cloud Computation
MIT researchers crafted a new approach that could allow anyone to run operations on encrypted data without decrypting it first.
-
-
CHINA WATCHSouth Korea Has Acted Decisively on DeepSeek. Other Countries Must Stop Hesitating
South Korea has suspended new downloads of DeepSeek, and it was right to do so. Chinese tech firms operate under the shadow of state influence, misusing data for surveillance and geopolitical advantage. Any country that values its data and sovereignty must watch this national security threat and take note of South Korea’s response.
-
-
CHINA WATCHIn Case We Forgot, Typhoon Attacks Remind Us of China’s Cyber Capability—and Intent
The Salt Typhoon incident reminds us that China has the intent, and increasingly the capability, to seriously challenge US and Western technology advantage.
-
-
DATA SECURITYDOGE Threat: How Government Data Would Give an AI Company Extraordinary Power
The Department of Government Efficiency, or DOGE, has secured unprecedented access to at least seven sensitive federal databases. Since information is power, concentrating unprecedented data in the hands of a private entity with an explicit political agenda represents a profound challenge to the republic. I believe that the question is whether the American people can stand up to the potentially democracy-shattering corruption such a concentration would enable. If not, Americans should prepare to become digital subjects rather than human citizens.
-
-
ELECTION SECURITYElection Officials Blast Trump’s “Retreat” from Protecting Voting Against Foreign Threats
The Trump administration has begun dismantling the nation’s defenses against foreign interference in voting, a sweeping retreat that has alarmed state and local election officials. The administration is shuttering the FBI’s Foreign Influence Task Force and last week cut more than 100 positions at the U.S. Cybersecurity and Infrastructure Security Agency.
-
More headlines
The long view
CYBERSECURITYNeed for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.