Europe's most valuable technology company, ASML Holdings, is responsible for the manufacturing of semiconductor machinery (the indispensable machines that make the chips). The chip-machinery maker has …
We Have a Privacy Executive Order! Time to See It in Action
In late February 2024, the Biden Administration issued its long-awaited Executive Order to protect the personal data of Americans from foreign threats by restricting access to Americans’ …
Continue Reading about We Have a Privacy Executive Order! Time to See It in Action
RAND Researchers Explore Scenarios for a U.S. Victory in a War with the PRC
Policy researchers from the Rand Corp. ponder the question: "How can the United States prevail in a limited war with the People's Republic of China (PRC) while avoiding catastrophic escalation?" Find …
Continue Reading about RAND Researchers Explore Scenarios for a U.S. Victory in a War with the PRC
An Overview of the NIST Cybersecurity Framework 2.0
The NIST Cybersecurity Framework (CSF) 2.0, an evolution of its predecessor, is a comprehensive guide designed to assist organizations across various sectors in managing and mitigating cybersecurity …
Continue Reading about An Overview of the NIST Cybersecurity Framework 2.0
How To Properly Cut Your Cybersecurity Budget
Public companies face significant headwinds. High interest rates have increased the cost of capital, intense refactoring of supply chains has added new expenses, and many businesses have seen …
Continue Reading about How To Properly Cut Your Cybersecurity Budget
Implementation Plan 2.0 Faces a Crucial Test
According to recent reporting, the Office of the National Cyber Director (ONCD) intends to issue an update to the national cybersecurity strategy implementation plan in the coming …
Continue Reading about Implementation Plan 2.0 Faces a Crucial Test
The Defense Intelligence Agency on the Iranian-backed Drone Power of Russia and the Houthis
Two recently declassified Defense Intelligence Agency (DIA) reports extensively detail the Iranian-backed drone capabilities fueling the reconfiguration of global warfare into a drone swarm …
Reorient Your Organization: Scenarios Exploring a Quantum Attack on Critical U.S. Power Grid Infrastructure
The Hudson Institute report on "Risking Apocalypse? Quantum Computers and the US Power Grid" highlights the significant threat posed by potential quantum computer attacks on the US power grid. It …
i-SOON Data Leak Is Interesting but Mostly Unsurprising
Recently, a major data leak was discovered on GitHub possibly exposing documents tied to the cyber spying activities of the Chinese company i-SOON. Although it is unclear if …
Continue Reading about i-SOON Data Leak Is Interesting but Mostly Unsurprising
Two Emergent and Sophisticated Approaches to LLM Implementation in Cybersecurity
Google Security Engineering and The Carnegie Mellon University Software Engineering Institute (in collaboration with OpenAI) have sorted through the hype - and done some serious thinking and formal …