Are Betting Markets Better than Polling in Predicting Political Elections?
Authors: Laurie E. Cutting1, Sarah S. Hughes-Berheim2, Paul M. Johnson3, Hiba Baroud4, Brett Goldstein5
Authors: Laurie E. Cutting1, Sarah S. Hughes-Berheim2, Paul M. Johnson3, Hiba Baroud4, Brett Goldstein5
Blue Team Con 2025 takes place at the Fairmont Chicago, IL, with training sessions on September 4–5 and the main conference on September 6–7, 2025.
What It’s About
As the only in-person conference focused entirely on cybersecurity defenders, Blue Team Con gathers over 850 professionals—including SOC analysts, threat hunters, incident responders, and defensive developers—to share knowledge through hands-on training, villages, and talks.
Key Highlights
The NSA, CISA, FBI, and DoD’s DC3 released a joint Cybersecurity Information Sheet titled "Iranian Cyber Actors May Target Vulnerable U.S. Networks and Entities of Interest." The agencies caution that, despite an ongoing ceasefire, Iranian-affiliated threat actors—including state-sponsored groups and hacktivists—could soon launch disruptive campaigns against U.S. networks, particularly those with out-of-date systems or weak credentials.
Key Risks Highlighted:
Mark your calendars for DEF CON 33!
Taking place in Las Vegas from August 7–10, 2025, this is one of the world’s largest and most respected hacker conventions.
This year’s event includes dedicated sessions, workshops, and CTFs centered around memory corruption, exploit mitigations, and secure systems engineering:
Join the next Kawaiicon, New Zealand’s premier hacker conference, happening November 6–8, 2025 in Wellington. This year’s edition dives deep into modern exploit techniques, particularly automated memory corruption attacks and emerging mitigation strategies in native languages and runtimes.
Why it matters for SoS‑VO:
The Open Source Security Foundation (OpenSSF) has released The Memory Safety Continuum, a practical framework that helps developers, organizations, and security teams assess and improve their memory safety posture. Unveiled on April 28, 2025, the document positions memory safety not as a binary goal but as an evolving journey—enabling teams to advance their practices in phases through language adoption, mitigation, and testing.
The Continuum guides readers through four core states:
The NSA and CISA have jointly issued a Cybersecurity Information Sheet (CSI), titled Memory Safe Languages: Reducing Vulnerabilities in Modern Software Development, published on June 24, 2025. The guidance emphasizes that memory safety is "critical to a holistic approach to software security", and that using memory-safe languages (MSLs) can significantly lower the risk of memory-based exploits such as buffer overflows, use-after-free, and data races.
Since 2022, the university has offered classes centered around machine learning and artificial intelligence, reflecting the growing importance of these technologies across multiple industries. The program represents WSU Tri-Cities' commitment to providing cutting-edge education that matches current market demands and technological trends.
Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks.