• CYBERSECURITYU.S. Needs a New Independent Armed Service — a U.S. Cyber Force: Report

    In the U.S. military, an officer who had never fired a rifle would never command an infantry unit. Yet officers with no experience behind a keyboard are commanding cyber warfare units. This should change, as the need to create a new independent armed service — a U.S. Cyber Force – become more urgent by the day.

  • ELECTION SECURITYStates Rush to Combat AI Threat to Elections

    By Zachary Roth

    This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.

  • CYBERDETERRENCETantalizing Method to Study Cyberdeterrence

    By Trina West

    Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.

  • THREATS TO INFRASTRUCTUREHouthi Attacks in Red Sea Threaten Internet Infrastructure

    By Nik Martin

    The recent attack on the cargo ship Rubymar by the Iran-backed Houthis caused the crew to drop anchor, which damaged undersea internet cables, the US has said. Could the vital infrastructure now become a regular target?

  • CYBERSECURITYCollegiate Cyber Defenders Shine in Inaugural Conquer the Hill — Command Edition Competition

    By Michael Kooi

    Seventy-five college students competed to test their skills in the fundamentals of IT and cybersecurity infrastructure. The DOE’s CyberForce Program aims to help develop a pipeline of skilled cyber defenders for the energy sector through competitions, webinars, career fairs, and resources for building skills.

  • CYBERSECURITY EDUCATION$2.6 Million NSF Grant for FAU’s CyberCorps Student Scholarship Program

    A $2.6 million grant from the National Science Foundation (NSF) will allow FAU to establish a scholarship program in the rapidly growing field of cybersecurity. The program is managed by the NSF and DHS. Designed to increase the volume and strength of the nation’s cybersecurity workforce, the program provides full scholarships and stipends to students pursuing studies at the intersection of cybersecurity and AI.

  • CYBERSECURITYUVA Engineering Researcher Has Plan to Defeat the Next Big Cyberattack

    By Sara Novak

    “Zero-day attacks” are the cyberattacks that disable large-scale computer programs, catching their victims off guard. In recent years, they’ve been happening more often and have become increasingly difficult to fix. From zero-day to ransomeware attacks, UVA’s Ashish Venkat believes cybersecurity should be fast and affordable for all.

  • CYBERSECURITYComputer Scientists Awarded $3M to Bolster Cybersecurity

    By Louis DiPietro

    A $3 million grant from the DARPA, the research and development arm of the U.S. Department of Defense, aims to leverage reinforcement learning to make computer networks stronger, dynamic and more secure.

  • CYBERSECURITY EDUCATIONCyber Defenders: Interns Take on National Security Challenges

    By Mollie Rappe

    Over the past two decades, nearly 500 undergraduates and graduate students in cybersecurity, computer science, computer engineering and related fields have worked on research projects, attended training courses and technical tours while receiving mentorship and unparalleled networking opportunities.

  • SURVEILLANCEApple and Google Are Introducing New Ways to Defeat Cell Site Simulators, But Is it Enough?

    By Cooper Quintin

    Cell-site simulators (CSS)—also known as IMSI Catchers and Stingrays—are a tool that law enforcement and governments use to track the location of phones, intercept or disrupt communications, spy on foreign governments, or even install malware.

  • CYERSECURITYFuture-Proof Security Architecture for Healthcare Communications

    Electronic patient records, digital medication plans, e-prescriptions: These applications are all key elements of the telematics infrastructure (TI). Germany’s telematics infrastructure (TI) aims to allow healthcare professionals to exchange patient data securely, rapidly and from anywhere. The platform for healthcare applications will soon see a new, flexible and therefore future-proof security architecture.

  • CYERSECURITYDetecting Malware Through Hardware-Integrated Protection

    By Justin Agan

    What if malicious software and viruses – or malware – detection could simply be built into the hardware of future computers? With a grant from NSF, a Texas A&M lab will work to move malware detection from software to hardware, expanding on existing technology.

  • AIHow Trustworthy Are Large Language Models Like GPT?

    By Prabha Kannan

    More people feel comfortable outsourcing important projects to AI. New research shows why we shouldn’t, as generative AI may be riddled with hallucinations, misinformation, and bias.

  • AIUsing Quantum Computing to Protect AI from Attack

    By Max West and Sarah Erfani

    Despite their incredible successes and increasingly widespread deployment, machine learning-based frameworks such as AI remain highly susceptible to adversarial attacks – that is, malicious tampering with their data causing them to fail in surprising ways. AI can thus be fooled into making mistakes, sometimes risking lives — but quantum computing could provide a strong defense.

  • CYBERSECURITY EDUCATIONVirtual City Prepares Students for Future of Cybersecurity

    By Logan Burtch-Buus

    CyberApolis is a virtual city used to train the next generation of cyber professionals to address national security concerns. The “city” includes a bank, hospital, large retailer, water company, power companies, an underground hacker community, an organized crime family and a growing number of smaller retailers.