News
  • CISA Requests Comments on Product Security Bad Practices Guidance
    The Cybersecurity and Infrastructure Security Agency (CISA) invites feedback on its new guidance addressing “Product Security Bad Practices.” This guidance identifies security practices in product design and deployment that increase vulnerability to cy
  • 2025 RSA ID IQ Research Report Now Available
    The newly released 2025 RSA ID IQ Research Report provides in-depth insights into identity security trends, challenges, and innovations shaping the cybersecurity landscape.
  • Supply Chain Security Lessons from a Pager System Breach
    A recent incident involving pager system vulnerabilities highlights critical lessons for modern supply chain security.
  • AI Security: Emerging Threats and the Call for Global Collaboration
    At the recent Singapore International Cyber Week, cybersecurity experts stressed the urgency of addressing the unique security challenges posed by the rapid adoption of artificial intelligence (AI).
  • CMU Student Leverages AI to Streamline Cybersecurity Testing
    In a promising development for cybersecurity testing, a Central Michigan University undergraduate is pioneering the use of artificial intelligence to simplify testing processes for software vulnerabilities.
  • Enhancing Security in Industrial Control Systems with SDN/NFV
    Vijay Varadharajan, Uday Tupakula, and Kallol Krishna Karmakar's recent publication, Techniques for Enhancing Security in Industrial Control Systems (ACM Trans. Cyber-Phys.
  • "New Algorithms Increase the Privacy of Sensitive Data"
    Saloni Kwatra, a doctoral student at Umea University, has identified flaws in the technology known as "federated learning" or "collaborative learning" and developed new algorithms to bolster user security.
  • "Researchers Eye 'Topological Signatures' of Cyber Threats"
    Researchers at Pacific Northwest National Laboratory (PNNL) are developing a new method to exploring the higher-dimensional shape of cyber systems in order to identify adversarial attack signatures.
  • "New NSF-Backed Research Addressing Threat of Security Breaches in Semiconductor Design"
    The University of Maine's National Science Foundation (NSF)-funded collaborative research project, “KIPPER: A Scalable Learning-Guided Hardware IP Protection Platform,” will address the threat of confidentiality breaches in semiconductor design, includ
  • "Secure Messaging Through Distributed Messages"
    Researchers at the Technical University of Darmstadt have developed a method called "Encrypted Multi-Channel Communication" (EMC2) to secure sensitive messages by distributing trust across multiple communication channels.
  • "Grad Student Works With Research Team to Strengthen Nonprofits’ Cybersecurity"
    Anivesh Sinha, a master's student in Information Science at Penn State Great Valley, is collaborating with a team of faculty and other students to conduct a Presidential Public Impact Research Project to help Pennsylvania nonprofit organizations improv
  • "Security in Quantum Computing"
    Researchers at the National Center for Supercomputing Applications (NCSA), a unit of the University of Illinois Urbana-Champaign, are addressing the issue of practical quantum computers breaking classical encryption before it becomes an actual problem.