New integrated chip shows how quantum networks could “speak” today’s internet language on existing commercial fiber-optic cables In a first-of-its-kind experiment, engineers at the University of Pennsylvania brought quantum networking out of…

New integrated chip shows how quantum networks could “speak” today’s internet language on existing commercial fiber-optic cables In a first-of-its-kind experiment, engineers at the University of Pennsylvania brought quantum networking out of…
Although some fear that AI will flood the market, harming existing copyrighted works, historical examples seem to tell a different story. On June 25, federal district court Judge Vince Chhabria ruled against a group…
Cyber contingency campaigning, involving sustained cyber activity in peacetime, could be strategically impactful in a China-Taiwan scenario. In May, Secretary of Defense Pete Hegseth characterized China as America’s “pacing” threat. Experts agree that among…
By taking Taiwan, China could erase America’s best hope of keeping its AI edge. For decades, a fragile equilibrium has held the peace in the Taiwan Strait. Despite China’s conviction that the…
A European Defense Union must take a new, balanced approach to privacy and security, requiring flexibility from EU members and institutions. “Protecting Europe is Europe’s duty. I believe now is therefore the…
Code now governs what users see, say, and know—across borders, without consent. It’s time to rethink what foreign influence really means. In early 2022, TikTok users in Kenya saw their feeds flooded…
A recent study from researchers at University of California San Diego is the first detailed assessment of companies offering school-based online surveillance services such as social media monitoring, student communications monitoring and online activity…
A review of Tamar Mitts, “Safe Havens for Hate: The Challenge of Moderating Online Extremism” (Princeton University Press, 2025). Tamar Mitts’s “Safe Havens for Hate” arrives at a moment when debates over online extremism…
How buyers can use performance measures to drive better security in software products. In June 2017, a cyberattack known as notPetya corrupted the Ukrainian tax accounting software Medoc and used it to infect victim…