Forthcoming cybersecurity rules for federal contractors increase not only the requirements contractors have to follow but also the regulatory reach of federal agencies. In October 2023, the Federal Acquisition Regulation (FAR) Council proposed…
After costly misses on semiconductors and 5G, the United States needs to level up its analysis of long-term technology trends to better anticipate threats and secure its leadership. Just over 50 years…
Review of “Israel and the Cyber Threat: How the Startup Nation Became a Global Cyber Power” by Charles D. Freilich, Matthew S. Cohen, and Gabi Sabonoi. “Israel and the Cyber Threat” is…
From misinformation and invisible cyber attacks, to irresponsible AI that could cause events involving multiple deaths, expert futurists have forecast how rapid technology changes may shape our world by 2040. As the…
UTSA announced a pioneering initiative to reshape its academic landscape with the creation of a new college dedicated to artificial intelligence (AI), cybersecurity, computing, data science and related disciplines. This initiative aligns…
Updating passwords for all users of a company or institution’s internal computer systems is stressful and disruptive to both users and IT professionals. Many studies have looked at user struggles and password…
Computer science researchers have developed a new way to identify security weaknesses that leave people vulnerable to account takeover attacks, where a hacker gains unauthorized access to online accounts. Most mobiles are…
In order to escape the computer security bootloop, Congress can create a new technology safety regulator of last resort—the Bureau of Technology Safety (BoTS). In the 1993 film “Groundhog Day,” a weatherman…
TikTok’s victory in Montana (not to mention its defeat in Texas) paradoxically bodes poorly for TikTok’s ability to challenge a federal ban. On Nov 30, 2023, the U.S. District Court for the…
A pair of recent cyberattacks demonstrate how adversaries are changing their strategies. Editor’s Note: The United States often treats foreign cyberattacks on U.S. infrastructure more as an annoyance than a threat. Such a…