• CYBERSECURITYA Quarter of World's Internet Users Rely on Infrastructure Highly Vulnerable to Attack

    About a quarter of the world’s Internet users live in countries that are more susceptible than previously thought to targeted attacks on their Internet infrastructure. Many of the at-risk countries are located in the Global South.

  • INSIDER THREATIdentifying and Predicting Insider Threats

    Insider threats are one of the top security concerns facing large organizations. Current and former employees, business partners, contractors—anyone with the right level of access to a company’s data—can pose a threat. A new project seeks to detect and predict insider threats.

  • FOOD SECURITYFood Production Vulnerable to Cyberattacks

    Wide-ranging use of smart technologies is raising global agricultural production but cyber experts warn this digital-age phenomenon could reap a crop of another kind – cybersecurity attacks.

  • CRITICAL INFRASTRUCTURES&T Hackathon: Thwarting Emerging Threats to Critical Infrastructure

    Threats against the U.S. critical infrastructure are not new—physical threats and natural disasters have challenged the U.S. critical infrastructure and their support systems time and time again. But the rapid development of new information and communication technologies, and their inevitable integration the into the U.S. critical infrastructure, bring with them the possibility of digital attacks and other new challenges that the United States must be ready to face.

  • CYBERSECURITYBad for Computer Security: Employees Returning to the Office

    When employees feel they deserve superior technology compared to other employees—and they don’t receive unrestricted access to it—they pose a security risk to their companies, according to a new research.

  • RANSOMWAREFaster Ransomware Detection

    Ransomware extortion is hugely expensive, and instances of ransomware extortion are on the rise. The FBI reports receiving 3,729 ransomware complaints in 2021, with costs of more than $49 million. What’s more, 649 of those complaints were from organizations classified as critical infrastructure.

  • CYBERSECURITYNew Method Kills Cyberattacks in Less Than a Second

    Researchers, using artificial intelligence, new method that could automatically detect and kill cyberattacks on our laptops, computers and smart devices in under a second.

  • CYBERSECURITYHow Destructive Is a DDoS Cyberattack?

    By Esteban Pardo

    Last weekend, Russian hackers attacked several German government websites. These cyberattacks were seemingly harmless, much to the relief of the authorities. But many others are not so lucky.

  • CYBERSECURITYUndetected and Dormant: Managing Australia’s Software Security Threat

    By Sarah Sloan

    At the same time as software has become integral to our prosperity and national security, attacks on software supply chains are on the rise. Software supply chain attacks are popular, can have a big impact and are used to great effect by a range of cyber adversaries.

  • SUPPLY-CHAIN SECURITYCybersecurity Guidance for Supply Chain Risk Management

    A new update to the NIST’s cybersecurity supply chain risk management (C-SCRM) guidance aims to help organizations protect themselves as they acquire and use technology products and services.

  • WAR IN UKRAINERussia’s Hybrid War in Ukraine

    By Tom Burt

    Microsoft last week released a report which details a broad cyberattacks campaign by Russia in Ukraine, a campaign conducted in concert with kinetic military action. At least six Russian Advanced Persistent Threat (APT) actors and other unattributed threats, have conducted destructive attacks, espionage operations, or both, while Russian military forces attack the country by land, air, and sea.

  • CYBERSECURITYA Cyber Security Intrusion Detection System for Industrial Control Systems

    Researchers have developed technology to help government and industry detect cyber threats to industrial networks used in critical infrastructure and manufacturing systems.

  • CYBERSECURITYNew Tool in the Fight Against Hackers

    A new form of security identification could soon see the light of day and help us protect our data from hackers and cybercriminals. Quantum mathematicians have solved a mathematical riddle that allows for a person’s geographical location to be used as a personal ID that is secure against even the most advanced cyberattacks.

  • CYBERSECURITYAI, Machine Learning to Help Defend Against Cyberattacks

    Two new tools are helping cybersecurity professionals fight the vast volume of threats and attacks— artificial intelligence (AI) and machine learning. AI and machine learning can detect novel malicious code, catch fraudulent charges on a credit card or fraudulent network login attempts, block phishing messages on an email service and assist companies with cloud management in spotting anomalies that traditional cyber defense technologies may not pick up.

  • CYBERSECURITY EDUCATIONIllinois Tech's CyberHawks Win National Cybersecurity Championship

    A team of students from Illinois Institute of Technology’s cybersecurity student organization CyberHawks won the National Centers of Academic Excellence in Cybersecurity Cyber Games National Championship last week. Sixty-five teams from 55 colleges competed in the competition overall.