• Quantum Computing Vulnerabilities of National Critical Functions

    How are the national critical functions (NCFs) vulnerable to future quantum computing capabilities? How should the federal government prioritize assistance to critical infrastructure owners and operators?

  • Prioritizing Cybersecurity Risk in Election Infrastructure

    How can jurisdictions at each level prioritize their efforts to combat the risk of cyberattacks on their election systems? How can they assess the likelihood of a successful attack? How can they assess the scale and severity of an attack?

  • Former U.S. Cyber Command and NSA Chief Makes the Case for a Cyber Competition Strategy

    Former U.S. National Security Agency and U.S. Cyber Command boss Mike Rogers asks: “What is our vision of the key technologies, the most critical sectors that are really going to drive economic advantage … and [that] if placed at risk would cause us harm, [and] what are the policies we need to create advantage for ourselves?” A new cybersecurity strategy based on what is required to become and remain competitive, secure and resilient should focus on this central question.

  • Thinking Like a Cyber-Attacker to Protect User Data

    Researchers found that an understudied component of computer processors is susceptible to attacks from malicious agents. Then, they developed mitigation mechanisms.

  • Rise of Precision Agriculture Exposes Food System to New Threats

    Farmers are adopting precision agriculture, using data collected by GPS, satellite imagery, internet-connected sensors and other technologies to farm more efficiently. These practices could help increase crop yields and reduce costs, but the technology behind the practices is creating opportunities for extremists, terrorists and adversarial governments to attack farming machinery, with the aim of disrupting food production.

  • NSF Grants to Protect Data, User privacy

    Researchers are working on two new cybersecurity projects, recently funded by the National Science Foundation, to ensure trustworthy cloud computing and increase computing privacy for marginalized and vulnerable populations.

  • How Daycare Apps Can Spy on Parents and Children

    Daycare apps are designed to make everyday life in daycare centers easier. Parents can use them, for example, to access reports on their children’s development and to communicate with teachers. However, some of these applications have serious security flaws.

  • When the Hardware Traps Criminals

    Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick.

  • Hack Post-Quantum Cryptography Now So That Bad Actors Don’t Do It Later

    In February, the cryptography community was stunned when a researcher claimed that an algorithm that might become a cornerstone of the next generation of internet encryption can be cracked mathematically using a single laptop. Edward Parker and Michael Vermeer write that this finding may have averted a massive cybersecurity vulnerability, but it also raises concerns that new encryption methods for securing internet traffic contain other flaws that have not yet been detected.

  • China Tried to Infiltrate Federal Reserve: Senate Report

    Fed Chair Jerome Powell and a senior member of Congress are at odds over a report issued Tuesday by Senate Republicans alleging that China is trying to infiltrate the Federal Reserve and that the central bank has done too little to stop it. China’s goal, according to the report, is to “supplant the U.S. as the global economic leader and end the U.S. dollar’s status as the world’s primary reserve currency.”

  • New Chief Information Officer (CIO) Program at NYU

    Created in partnership with Emeritus, the new nine-month executive program helps senior technology leaders and CIOs advance their C-suite leadership skills, transform information systems, and navigate rapidly changing remote and workforce trends.

  • NIST Updates Guidance for Health Care Cybersecurity

    In an effort to help health care organizations protect patients’ personal health information, NIST has updated its cybersecurity guidance for the health care industry. The revised draft publication aims to help organizations comply with HIPAA Security Rule.

  • Solution to Encrypted Messages Being Hacked Before Sending or After Receipt

    Message applications must do more to keep user data safe from undetected malware or over-the-shoulder eavesdropping that bypasses encryption before a message has been sent. Researchers have created a new end-to-end encryption mechanism that protects users’ communications at a far higher level than currently experienced on popular applications.

  • Google/Apple's Contact-Tracing Apps Susceptible to Digital Attacks

    Since the beginning of the COVID-19 pandemic, scientists and health authorities have relied on contact-tracing technologies to help manage the spread of the virus. Yet there’s a major flaw in a framework that many of these mobile apps utilize – one that attackers could exploit to ramp up false positive notifications.

  • U.S. Disrupts North Korea Ransomware Group, Recovers Nearly Half a Million

    U.S. law enforcement authorities have disrupted a group of North Korean hackers, recovering nearly half a million dollars in ransom payments it received from a Kansas hospital, a Colorado health care provider and other victims. The North Korea state-sponsored cybercriminals encrypted the Kansas hospital’s servers in May 2021, demanding ransom in exchange for regaining access to its critical computer networks.