• THREATS TO INFRASTRUCTUREHouthi Attacks in Red Sea Threaten Internet Infrastructure

    By Nik Martin

    The recent attack on the cargo ship Rubymar by the Iran-backed Houthis caused the crew to drop anchor, which damaged undersea internet cables, the US has said. Could the vital infrastructure now become a regular target?

  • CYBERSECURITYCollegiate Cyber Defenders Shine in Inaugural Conquer the Hill — Command Edition Competition

    By Michael Kooi

    Seventy-five college students competed to test their skills in the fundamentals of IT and cybersecurity infrastructure. The DOE’s CyberForce Program aims to help develop a pipeline of skilled cyber defenders for the energy sector through competitions, webinars, career fairs, and resources for building skills.

  • CYBERSECURITY EDUCATION$2.6 Million NSF Grant for FAU’s CyberCorps Student Scholarship Program

    A $2.6 million grant from the National Science Foundation (NSF) will allow FAU to establish a scholarship program in the rapidly growing field of cybersecurity. The program is managed by the NSF and DHS. Designed to increase the volume and strength of the nation’s cybersecurity workforce, the program provides full scholarships and stipends to students pursuing studies at the intersection of cybersecurity and AI.

  • CYBERSECURITYUVA Engineering Researcher Has Plan to Defeat the Next Big Cyberattack

    By Sara Novak

    “Zero-day attacks” are the cyberattacks that disable large-scale computer programs, catching their victims off guard. In recent years, they’ve been happening more often and have become increasingly difficult to fix. From zero-day to ransomeware attacks, UVA’s Ashish Venkat believes cybersecurity should be fast and affordable for all.

  • CYBERSECURITYComputer Scientists Awarded $3M to Bolster Cybersecurity

    By Louis DiPietro

    A $3 million grant from the DARPA, the research and development arm of the U.S. Department of Defense, aims to leverage reinforcement learning to make computer networks stronger, dynamic and more secure.

  • CYBERSECURITY EDUCATIONCyber Defenders: Interns Take on National Security Challenges

    By Mollie Rappe

    Over the past two decades, nearly 500 undergraduates and graduate students in cybersecurity, computer science, computer engineering and related fields have worked on research projects, attended training courses and technical tours while receiving mentorship and unparalleled networking opportunities.

  • SURVEILLANCEApple and Google Are Introducing New Ways to Defeat Cell Site Simulators, But Is it Enough?

    By Cooper Quintin

    Cell-site simulators (CSS)—also known as IMSI Catchers and Stingrays—are a tool that law enforcement and governments use to track the location of phones, intercept or disrupt communications, spy on foreign governments, or even install malware.

  • CYERSECURITYFuture-Proof Security Architecture for Healthcare Communications

    Electronic patient records, digital medication plans, e-prescriptions: These applications are all key elements of the telematics infrastructure (TI). Germany’s telematics infrastructure (TI) aims to allow healthcare professionals to exchange patient data securely, rapidly and from anywhere. The platform for healthcare applications will soon see a new, flexible and therefore future-proof security architecture.

  • CYERSECURITYDetecting Malware Through Hardware-Integrated Protection

    By Justin Agan

    What if malicious software and viruses – or malware – detection could simply be built into the hardware of future computers? With a grant from NSF, a Texas A&M lab will work to move malware detection from software to hardware, expanding on existing technology.

  • AIHow Trustworthy Are Large Language Models Like GPT?

    By Prabha Kannan

    More people feel comfortable outsourcing important projects to AI. New research shows why we shouldn’t, as generative AI may be riddled with hallucinations, misinformation, and bias.

  • AIUsing Quantum Computing to Protect AI from Attack

    By Max West and Sarah Erfani

    Despite their incredible successes and increasingly widespread deployment, machine learning-based frameworks such as AI remain highly susceptible to adversarial attacks – that is, malicious tampering with their data causing them to fail in surprising ways. AI can thus be fooled into making mistakes, sometimes risking lives — but quantum computing could provide a strong defense.

  • CYBERSECURITY EDUCATIONVirtual City Prepares Students for Future of Cybersecurity

    By Logan Burtch-Buus

    CyberApolis is a virtual city used to train the next generation of cyber professionals to address national security concerns. The “city” includes a bank, hospital, large retailer, water company, power companies, an underground hacker community, an organized crime family and a growing number of smaller retailers.

  • CYBERSECURITYMajor Update to NIST’s Widely Used Cybersecurity Framework

    The world’s leading cybersecurity guidance is getting its first complete makeover since its release nearly a decade ago. NIST has revised the framework to help benefit all sectors, not just critical infrastructure.

  • CYBERSECURITYDHS: Additional $374.9 Million in Funding to Boost State, Local Cybersecurity

    State and local governments face increasingly sophisticated cyber threats to their critical infrastructure and public safety. On Monday, DHS announced the availability of $374.9 million in grant funding for the Fiscal Year (FY) 2023 State and Local Cybersecurity Grant Program (SLCGP).

  • POWER-GRID RESILIENCEReached: Milestone in Power Grid Optimization on World’s First Exascale Supercomputer

    By Jeremy Thomas

    Ensuring the nation’s electrical power grid can function with limited disruptions in the event of a natural disaster, catastrophic weather or a manmade attack is a key national security challenge. Compounding the challenge of grid management is the increasing amount of renewable energy sources such as solar and wind that are continually added to the grid, and the fact that solar panels and other means of distributed power generation are hidden to grid operators.