Ironically, the two countries can look to the past, not the future, for inspiration on…
A review of Lennart Maschmeyer, “Subversion: From Covert Operations to Cyber Conflict” (Oxford University Press,…
Amid surging attacks, Kenya aims to expand its technology sector and improve cybersecurity to protect…
NATO allies need to allow their militaries to be proactive in cyberspace to ensure the…
Affected Platforms: Microsoft Windows Impacted Users: Microsoft Windows Impact: Compromised machines are under the control of the threat…
China Turns to Private Hackers as It Cracks Down on Online Activists on Tiananmen Square Anniversary
Every year ahead of the June 4 commemoration of the Tiananmen Square massacre, the Chinese…
Election integrity is back in the news as Canadian political party leaders react to an…
Artificial intelligence is rapidly becoming one of the most important assets in global competition, including…
Worcester Polytechnic Institute (WPI) researcher Shahin Tajik has been awarded a prestigious CAREER Award of $594,081 by the…
AI’s future cost and the trajectory of its development are currently unknown. Good AI policy…









