Examine how U.S. and PRC approaches to post-quantum cryptography (PQC) and quantum key distribution (QKD) reveal divergent ...
The Center for FCEB Resiliency is a multi-year initiative to support the Federal Civilian Executive Branch's digital ...
The Center for FCEB Resiliency is a multi-year initiative to support the Federal Civilian Executive Branch's digital transformation, security, and resiliency efforts. Through a series of public and ...
Discover why U.S. drone dominance depends on three interconnected pillars—policy, production, and protection. In this SC ...
In this essay, ICIT Fellow Jim Routh discusses how enterprises are gearing up to harness the benefits of Large Language Models (LLMs) and generative AI models. As AI adoption spreads, the use of LLMs ...
The infrastructure of the 2030s is being built now. Artificial intelligence systems are scaling across government and critical infrastructure. Low Earth Orbit (LEO) satellite networks are expanding ...
The plain truth is that – many CISOs don't understand materiality. In addition, many organizations have chosen to use a risk lens that downplays the actual risk of an incident, as well as the future ...
NATO faces a surge of hostile drones and electronic warfare that current defenses were not designed to defeat at scale, as seen in Ukraine and along the Alliance’s exposed flanks. The answer is an ...
This initiative was led by a distinguished Task Force, co-chaired by Cory Simpson and Brett Freedman, and included cybersecurity, business, and industry experts. It was motivated by pivotal events ...
The transition to hybrid work models has significantly increased security challenges for organizations, as employees and third parties access company resources from various remote locations. This ...
Colonel Candice E. Frost explores the threats by China, Russia, Iran, North Korea, and cybercrime in an in depth dive on their activities on networks. China, as the greatest persistent threat to ...