New survey findings and efforts to identify the most impactful security controls underscore the need for an empirical approach to defining—and promoting—security-by-design. Security-by-design is not a new idea. By some reckoning, it…
New survey findings and efforts to identify the most impactful security controls underscore the need for an empirical approach to defining—and promoting—security-by-design. Security-by-design is not a new idea. By some reckoning, it…
As artificial intelligence technology advances, one area lags behind: voice-activated AI. For the more than 80 million people who stutter, voice AI technologies, which are increasingly being used in job hiring practices,…
Forthcoming cybersecurity rules for federal contractors increase not only the requirements contractors have to follow but also the regulatory reach of federal agencies. In October 2023, the Federal Acquisition Regulation (FAR) Council proposed…
After costly misses on semiconductors and 5G, the United States needs to level up its analysis of long-term technology trends to better anticipate threats and secure its leadership. Just over 50 years…
Review of “Israel and the Cyber Threat: How the Startup Nation Became a Global Cyber Power” by Charles D. Freilich, Matthew S. Cohen, and Gabi Sabonoi. “Israel and the Cyber Threat” is…
From misinformation and invisible cyber attacks, to irresponsible AI that could cause events involving multiple deaths, expert futurists have forecast how rapid technology changes may shape our world by 2040. As the…
UTSA announced a pioneering initiative to reshape its academic landscape with the creation of a new college dedicated to artificial intelligence (AI), cybersecurity, computing, data science and related disciplines. This initiative aligns…
Updating passwords for all users of a company or institution’s internal computer systems is stressful and disruptive to both users and IT professionals. Many studies have looked at user struggles and password…
Computer science researchers have developed a new way to identify security weaknesses that leave people vulnerable to account takeover attacks, where a hacker gains unauthorized access to online accounts. Most mobiles are…