Techlandia Talks: Future of AI with Nick Reese
Podcast
In this episode of Techlandia, Skip Newberry interviews Nick Reese, founder of Triantha, a company focused on emerging technology education and consulting. Nick shares his journey from policymaker at the Department of Homeland Security to starting his own firm.
Trump’s Big, Beautiful L.L.M.
Quoted in the article.
The president’s grandly displayed A.I. Action Plan is long on frameworks but notably short on policy—a Rorschach test for fans and critics alike, revealing what researchers, scientists, and Big Tech companies want this young trillion-dollar industry to become (or avoid) as it matures at warp speed.
Unpacking Trump's Cybersecurity Executive Order
Podcast
In this Infosecurity podcast episode, the team dive into the details of Donald Trump's June 2025 Cybersecurity Executive Order (EO).
This EO revises previous orders from both Barack Obama and Joe Biden, while also removing a host of requirements from Biden's January 2025 EO.
Quantum Frontiers - Nick Reese on the Next Era of Tech and Trust
Podcast
AI, Privacy & Strategic Tech Risks
All Things Internal Audit Tech: Quantum Is Coming for Your Encryption. Now What?
Podcast
Quantum computing might sound futuristic, but internal auditors need to prepare now. Bill Truett catches up with Nick Reese to talk about what’s changed in the quantum space — including new cryptography standards — real-world risks, and what internal auditors can do today to get ready.
Survey: 83% of users prefer AI search over ‘traditional’ Googling
Quoted in the article
More than a trend – new data suggests AI search is a more efficient way to answer questions. The days of ‘Googling’ may be numbered. We asked Innovating with AI readers about their experience with AI search solutions, and more than 83% said they found AI-powered tools more efficient than traditional search.
What is TLS 1.3 (and why one security pro says it’s not quantum-safe)
Quoted in the article.
With a June 6 executive order, President Trump took a Sharpie to parts of President Biden’s final cybersecurity directive, including guidance related to post-quantum cryptography (PQC)—a defense against the super-fast machines that could someday break many of today’s message scramblers.
Emerging Technology in the Energy Sector:Threats, Vulnerabilities, and Recommendations for Industry
Emerging technologies are reshaping the energy sector, presenting both opportunities and significant security challenges. This paper investigates the transformative potential of quantum computing and artificial intelligence (AI) in areas such as grid management, operational efficiency, and predictive maintenance while highlighting the vulnerabilities they introduce
Space assets could be held ransom. Will we have any choice but to pay?
Ransomware exploits value. Attackers put victims against a decision to pay for the hope of the return of their system or lose it. For victims, it is hard to justify not paying even though it sets a harmful precedent. At heart, this is an economics question that cyber professionals find it difficult to answer on Earth. In space, the steep initial investments, slow times to market and operational costs of satellites and in-orbit infrastructure make the payment of a future ransomware attack against a satellite nearly assured.
RAW MATERIALS RISING
When you work in emerging tech, you get asked for lists.
People want to know what the top 5 or 10 or 50 emerging technologies will be this year and beyond.
The pace of emerging technology development inherently means that any list must be updated or revised before it can be useful to industry executives or government policy makers.
NIST loses key cyber experts in standards and research
Quoted in the article
The head of the agency’s Computer Security Division and roughly a dozen of his subordinates took the Trump administration’s retirement offers, placing key programs at risk. The departures are raising concerns over NIST’s work on emerging technology issues in quantum computing and artificial intelligence.
Barclay Damon Cyber Sip Podcast: Yes, You Can - But Should You? Strategies for Implementing Generative AI
Podcast
The conversation emphasizes the significance of understanding data security, the role of human oversight, and the establishment of AI governance to ensure ethical and effective implementation of AI solutions.
IHS Podcast: How Quantum Computers Could Break the Internet with Nick Reese
Podcast
Listen to Structurally Sound Podcast by IHS at Sam Houston State University. How quantum computers could break the internet.
Why the Signal chat leak might have exposed a big legal problem for Trump administration
Quoted in the article.
Lawmakers and legal experts claim the Yemen Signal group chat ‘blatantly violated security regulations designed to prevent exactly this kind of leak’
Undersea Cables & Starlink: The Hidden Conflicts of Global Connectivity
Global #communication #infrastructure is at the center of a geopolitical battle as nations and corporations strategize for security and control over #underseacables, #satellite networks, and #internet access. With privately owned systems like #Starlink and OneWeb revolutionizing connectivity, security risks, ownership disputes, and the potential for strategic manipulation are key issues in a hyperconnected world.
Risk of State-Sponsored Intellectual Property Theft and Protection
Intellectual property (IP) is a cornerstone of innovation and economic strength, yet it faces growing threats from state-sponsored theft. This paper explores the significance of IP theft for U.S. national security and economic stability, focusing on the legal frameworks, case studies, and methods used by state actors. It provides actionable recommendations for critical infrastructure owners and advisors to mitigate risks and enhance protections.
Are Microsoft and Amazon’s new chips about to unlock quantum computing?
Quoted in the article.
Just one week after Microsoft's announcement of Majorana 1, Amazon made headlines with the release of its Ocelot quantum chip. As the first quantum processor from AWS, the Ocelot chip promises significant advancements, but much like Microsoft’s claims, the press release was filled with bold assertions that still require substantiated evidence.
Elon Musk Points Finger at Ukraine for Cyber Attack on X That Caused Major Outages
Quoted in the article.
Elon Musk has pointed the finger at Ukraine for a major cyber attack on X (formerly Twitter), that caused outages throughout Monday.
Tens of thousands of users reported at least three major outages of the website and app.
The Revenge of Raw Materials
AI’s future is built on rare earth minerals—without them, even the most advanced AI models are just lines of code.
The standoff between raw materials required for advanced technologies and the finished technologies themselves could become an aspect of the upcoming sanctions and tariffs that are likely to be continued features of 2025. History gives us some interesting insights.