12th Annual Best Scientific Cybersecurity Paper Competition Winners

12th Annual Best Scientific Cybersecurity Paper Competition Winners

The National Security Agency (NSA) has awarded the 12th Annual Best Scientific Cybersecurity Paper Competition to “Decoding Trust: Comprehensive Assessment of Trustworthiness in GPT Models.” The winning paper, authored by 19 researchers including Professors Dawn Song (UC Berkeley), Bo Li (UIUC), and Sanmi Koyejo (Stanford), proposes a groundbreaking evaluation framework for assessing the trustworthiness of large language models (LLMs) such as GPTs.

Submitted by Regan Williams on

NSA 2023 Cybersecurity Year in Review

NSA 2023 Cybersecurity Year in Review

The National Security Agency has published their 2023 Cybersecurity Year in Review!

In an effort to be more transparent, the National Security Agency publishes an annual year in review sharing information regarding cybersecurity efforts that better equipped U.S. defenses against high priority cyber threats. NSA’s efforts to help secure the nation’s most sensitive systems also help your cybersecurity because NSA cascades these solutions through public guidance and engages with key technology providers to help them bolster the security of their products and services.

Submitted by Regan Williams on

Countering China State-Sponsored Actors Targeting Critical Infrastructure Organizations

Countering China State-Sponsored Actors Targeting Critical Infrastructure Organizations

The National Security Agency (NSA) and other U.S. and foreign organizations are releasing a joint Cybersecurity Advisory to expose advanced persistent threat (APT) actors sponsored by the Chinese government targeting telecommunications, government, transportation, lodging, and military infrastructure networks globally and outline appropriate mitigation guidance.

Submitted by Regan Williams on

China’s Cyber Warfare Dominance: How Artificial Intelligence is Shaping the Future of Global Conflicts

China’s Cyber Warfare Dominance: How Artificial Intelligence is Shaping the Future of Global Conflicts

China is emerging as a formidable player in the evolving landscape of cyber warfare, driven by its strategic use of artificial intelligence (AI). A recent article in Foreign Affairs explores how the country is integrating AI into its cyber capabilities, significantly enhancing its offensive and defensive operations in cyberspace.
Submitted by Regan Williams on

Defense Software for a Contested Future: Report Release Webinar

The National Academies Committee on Software Assurance and Nimbleness is pleased to announce the upcoming release of the report "Defense Software for a Contested Future." 

Synopsis: U.S. national security depends on defense software that is secure, reliable, and agile. A new report from The National Academies of Sciences, Engineering, and Medicine recommends ways the Department of Defense can develop and acquire software systems to reduce cyber risk and better meet changing mission needs.

Businesses Double Down on AI and Cloud, Despite Cyber Defense Oversights

Businesses Double Down on AI and Cloud, Despite Cyber Defense Oversights

A consistent theme in Unisys’ report is that companies are eagerly embracing new technologies like artificial intelligence at the expense of shoring up their cyber defenses against well-known threats. At the same time as many organizations eschew access-control technologies, for example, roughly three-quarters of them told Unisys that they plan to spend more money on cloud services that are routinely breached through identity-based attacks.

Submitted by Regan Williams on

IEEE 5th Cyber Awareness and Research Symposium 2025

IEEE 5th Cyber Awareness and Research Symposium 2025

The IEEE 5th Cyber Awareness and Research Symposium 2025 (CARS’25) will be held from October 27th to 30th, 2025. The IEEE Cyber Awareness and Research Symposium (CARS) is a premier event that brings together researchers, industry leaders, and students to explore cutting-edge cybersecurity challenges and advancements.

Submitted by Regan Williams on

Confronting Core Problems in Cybersecurity

Confronting Core Problems in Cybersecurity

It’s common for governors and mayors to declare a state of emergency and activate the National Guard in the aftermath of hurricanes, tornadoes, and other natural disasters. But last month, officials in Minnesota took these steps in the wake of a major cyberattack on the city of St. Paul — a testament to how disruptive these attacks have become. The attack, and the city’s efforts to contain the damage, hobbled city operations and a range of services online and in real life for citizens.

Submitted by Regan Williams on
Subscribe to