-
U.S. Unveils Aggressive National Cybersecurity Strategy
The Biden administration is pushing for more comprehensive federal regulations to keep the online realm safer against hackers, including by shifting cybersecurity responsibilities away from consumers to industry and treating ransomware attacks as national security threats.
-
-
How One of the World's Most Popular Open-Source Security Monitoring Platforms Was Developed
A tool from the internet’s early days keeps Microsoft’s users secure while supporting the open-source paradigm.
-
-
Is China’s Huawei a Threat to U.S. National Security?
The Chinese telecommunications company, a world leader in 5G technology and smartphones, faces accusations that the Chinese intelligence services can use – and have used — its 5G infrastructure for espionage. The U.S. and other Western countries have effectively banned Huawei from building their 5G networks, but it remains popular in low-income countries. The outcome of the struggle could shape the world’s tech landscape for years to come.
-
-
Grant to Support High-Potential Computer Science Students
The University of Texas at El Paso received a $5 million grant from the National Science Foundation (NSF) to provide financial support and professional development experiences to talented students in the field of computer science.
-
-
$4.8M to Address National Cybersecurity Workforce Shortage
Oregon State University has received $4.8 million from the National Science Foundation to help the United States close a big gap between the number of cybersecurity job openings and the number of qualified applicants for those positions.
-
-
Nextgen Cybersecurity: A 5G-Enabled AI-Based Malware Classification System
Researchers develop a 5G-enabled deep learning approach for classifying malware attacks on the Industrial Internet of Things.
-
-
Cybersecurity Professionals May Be Burning Out at a Faster Rate Than Frontline Health Care
More attention should be paid to the fast rate of burn-out among cybersecurity professionals. Hundreds of thousands of cybersecurity jobs are vacant owing to lack of cybersecurity talent – and that number is growing, among other things, by thousands of cybersecurity professionals who leave the field after a few short years.
-
-
DHS Unveils New Cybersecurity Performance Goals for Critical Infrastructure
DHS released the Cybersecurity Performance Goals (CPGs), voluntary practices that outline the highest-priority baseline measures businesses and critical infrastructure owners of all sizes can take to protect themselves against cyber threats.
-
-
Ensuring Our Workforce Is Cyber Ready
Remaining vigilant and prepared to protect our nation’s cybersecurity is one of DHS S&T’s highest priorities. To meet this goal, S&T is harnessing the intellectual power of America’s universities and leveraging some of the best and brightest subject matter experts and academic minds via S&T Centers of Excellence (COE).
-
-
NYU to Create Comprehensive Cybersecurity and Resiliency Program
The quantity, velocity and variety of cybersecurity attacks worldwide reflect the proliferation of connected devices, advances in extended reality systems, AI, telecommunications, and global supply chains powered by the Internet. At the same time, there is a shortfall of cybersecurity and resiliency experts with real-world training and immersion in cutting-edge research and technology to face these challenges.
-
-
What Would It Take to Survive an EMP Attack?
We are increasingly vulnerable to both natural disruptions and military attacks on our power grids. An electromagnetic pulse impulses (EMPs) would destroy your electronics, leaving you and your surroundings intact — but without easy means of survival. Remember, almost all conventional power sources and the entire internet would be knocked out and might take many months to replace.
-
-
Protecting National Public Warning System from EMPs
DHS released a report of operational approaches to protect the National Public Warning System from an electromagnetic pulse (EMP). The report summarizes recommendations that federal, state, local agencies, and private sector critical infrastructure owners and operators can employ to protect against the effects of an EMP event.
-
-
Former U.S. Cyber Command and NSA Chief Makes the Case for a Cyber Competition Strategy
Former U.S. National Security Agency and U.S. Cyber Command boss Mike Rogers asks: “What is our vision of the key technologies, the most critical sectors that are really going to drive economic advantage … and [that] if placed at risk would cause us harm, [and] what are the policies we need to create advantage for ourselves?” A new cybersecurity strategy based on what is required to become and remain competitive, secure and resilient should focus on this central question.
-
-
Artificial Intelligence Isn’t That Intelligent
In the world of information security, social engineering is the game of manipulating people into divulging information that can be used in a cyberattack or scam. Cyber experts may therefore be excused for assuming that AI might display some human-like level of intelligence that makes it difficult to hack. Unfortunately, it’s not. It’s actually very easy.
-
-
FAU Receives State Grant for Cybersecurity, IT Training
Cybersecurity jobs are expected to grow by a faster-than-average 33 percent over the next 10 years. In addition, cybersecurity-related job postings have increased by 43 percent in the past year. Florida launches a $15.6 million initiative to prepare students and mid-career professionals for jobs in the fields of cybersecurity and information technology.
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.