Former ONCD official urges defense industrial base to integrate formal methods to ensure software cyber resilience

Former ONCD official urges defense industrial base to integrate formal methods to ensure software cyber resilience

Former Office of the National Cyber Director official Anjana Rajan said the defense industrial base should move toward integrating formal methods to prove software is secure from cyber vulnerabilities, as the Defense Department and other agencies look to prioritize efficiencies.

Submitted by Regan Williams on

NSA SoS Internship Open for Applications for Summer 2026

NSA SoS Internship Open for Applications for Summer 2026

The NSA's Summer Intern Program is currently accepting applications for students to come work at the agency next summer. 

In addition to many others, the Science of Security program is accepting applications during this call. 

The acceptance period is condensed significantly this year (1 September- 14 September)

Details may be found at the link below: 

Submitted by Adam Tagert on

Countering China State-Sponsored Actors Targeting Critical Infrastructure Organizations

Countering China State-Sponsored Actors Targeting Critical Infrastructure Organizations

The National Security Agency (NSA) and other U.S. and foreign organizations are releasing a joint Cybersecurity Advisory to expose advanced persistent threat (APT) actors sponsored by the Chinese government targeting telecommunications, government, transportation, lodging, and military infrastructure networks globally and outline appropriate mitigation guidance.

Submitted by Regan Williams on

China’s Cyber Warfare Dominance: How Artificial Intelligence is Shaping the Future of Global Conflicts

China’s Cyber Warfare Dominance: How Artificial Intelligence is Shaping the Future of Global Conflicts

China is emerging as a formidable player in the evolving landscape of cyber warfare, driven by its strategic use of artificial intelligence (AI). A recent article in Foreign Affairs explores how the country is integrating AI into its cyber capabilities, significantly enhancing its offensive and defensive operations in cyberspace.
Submitted by Regan Williams on

Defense Software for a Contested Future: Report Release Webinar

The National Academies Committee on Software Assurance and Nimbleness is pleased to announce the upcoming release of the report "Defense Software for a Contested Future." 

Synopsis: U.S. national security depends on defense software that is secure, reliable, and agile. A new report from The National Academies of Sciences, Engineering, and Medicine recommends ways the Department of Defense can develop and acquire software systems to reduce cyber risk and better meet changing mission needs.

Businesses Double Down on AI and Cloud, Despite Cyber Defense Oversights

Businesses Double Down on AI and Cloud, Despite Cyber Defense Oversights

A consistent theme in Unisys’ report is that companies are eagerly embracing new technologies like artificial intelligence at the expense of shoring up their cyber defenses against well-known threats. At the same time as many organizations eschew access-control technologies, for example, roughly three-quarters of them told Unisys that they plan to spend more money on cloud services that are routinely breached through identity-based attacks.

Submitted by Regan Williams on

IEEE 5th Cyber Awareness and Research Symposium 2025

IEEE 5th Cyber Awareness and Research Symposium 2025

The IEEE 5th Cyber Awareness and Research Symposium 2025 (CARS’25) will be held from October 27th to 30th, 2025. The IEEE Cyber Awareness and Research Symposium (CARS) is a premier event that brings together researchers, industry leaders, and students to explore cutting-edge cybersecurity challenges and advancements.

Submitted by Regan Williams on

Confronting Core Problems in Cybersecurity

Confronting Core Problems in Cybersecurity

It’s common for governors and mayors to declare a state of emergency and activate the National Guard in the aftermath of hurricanes, tornadoes, and other natural disasters. But last month, officials in Minnesota took these steps in the wake of a major cyberattack on the city of St. Paul — a testament to how disruptive these attacks have become. The attack, and the city’s efforts to contain the damage, hobbled city operations and a range of services online and in real life for citizens.

Submitted by Regan Williams on
Subscribe to