Position Opening: Experimental Quantum Science at Princeton University

Position Opening: Experimental Quantum Science at Princeton University

The Princeton Quantum Initiative (PQI) and the Department of Physics at Princeton University seek applications for a tenure-track assistant professor faculty position in experimental quantum science. Candidates in all areas of experimental quantum science, including quantum information processing, sensing, computing, and networks, who research different experimental platforms, are encouraged to apply. 

Submitted by Regan Williams on

New Edition: The Next Wave, Vol. 26, No. 1, 2025

New Edition: The Next Wave, Vol. 26, No. 1, 2025

Artificial Intelligence (AI) has garnered significant attention in recent years, but its roots extend deep into the past. Fundamental AI concepts emerged in the 1950s, with the first neural network constructed from vacuum tubes in 1951 and the concept of training models from data defined in 1958.

Submitted by Regan Williams on

Former ONCD official urges defense industrial base to integrate formal methods to ensure software cyber resilience

Former ONCD official urges defense industrial base to integrate formal methods to ensure software cyber resilience

Former Office of the National Cyber Director official Anjana Rajan said the defense industrial base should move toward integrating formal methods to prove software is secure from cyber vulnerabilities, as the Defense Department and other agencies look to prioritize efficiencies.

Submitted by Regan Williams on

NSA SoS Internship Open for Applications for Summer 2026

NSA SoS Internship Open for Applications for Summer 2026

The NSA's Summer Intern Program is currently accepting applications for students to come work at the agency next summer. 

In addition to many others, the Science of Security program is accepting applications during this call. 

The acceptance period is condensed significantly this year (1 September- 14 September)

Details may be found at the link below: 

Submitted by Adam Tagert on

Countering China State-Sponsored Actors Targeting Critical Infrastructure Organizations

Countering China State-Sponsored Actors Targeting Critical Infrastructure Organizations

The National Security Agency (NSA) and other U.S. and foreign organizations are releasing a joint Cybersecurity Advisory to expose advanced persistent threat (APT) actors sponsored by the Chinese government targeting telecommunications, government, transportation, lodging, and military infrastructure networks globally and outline appropriate mitigation guidance.

Submitted by Regan Williams on

China’s Cyber Warfare Dominance: How Artificial Intelligence is Shaping the Future of Global Conflicts

China’s Cyber Warfare Dominance: How Artificial Intelligence is Shaping the Future of Global Conflicts

China is emerging as a formidable player in the evolving landscape of cyber warfare, driven by its strategic use of artificial intelligence (AI). A recent article in Foreign Affairs explores how the country is integrating AI into its cyber capabilities, significantly enhancing its offensive and defensive operations in cyberspace.
Submitted by Regan Williams on

Defense Software for a Contested Future: Report Release Webinar

The National Academies Committee on Software Assurance and Nimbleness is pleased to announce the upcoming release of the report "Defense Software for a Contested Future." 

Synopsis: U.S. national security depends on defense software that is secure, reliable, and agile. A new report from The National Academies of Sciences, Engineering, and Medicine recommends ways the Department of Defense can develop and acquire software systems to reduce cyber risk and better meet changing mission needs.

Businesses Double Down on AI and Cloud, Despite Cyber Defense Oversights

Businesses Double Down on AI and Cloud, Despite Cyber Defense Oversights

A consistent theme in Unisys’ report is that companies are eagerly embracing new technologies like artificial intelligence at the expense of shoring up their cyber defenses against well-known threats. At the same time as many organizations eschew access-control technologies, for example, roughly three-quarters of them told Unisys that they plan to spend more money on cloud services that are routinely breached through identity-based attacks.

Submitted by Regan Williams on
Subscribe to