What is TLS 1.3 (and why one security pro says it’s not quantum-safe)
Quoted in the article.
With a June 6 executive order, President Trump took a Sharpie to parts of President Biden’s final cybersecurity directive, including guidance related to post-quantum cryptography (PQC)—a defense against the super-fast machines that could someday break many of today’s message scramblers.
Emerging Technology in the Energy Sector:Threats, Vulnerabilities, and Recommendations for Industry
Emerging technologies are reshaping the energy sector, presenting both opportunities and significant security challenges. This paper investigates the transformative potential of quantum computing and artificial intelligence (AI) in areas such as grid management, operational efficiency, and predictive maintenance while highlighting the vulnerabilities they introduce
Space assets could be held ransom. Will we have any choice but to pay?
Ransomware exploits value. Attackers put victims against a decision to pay for the hope of the return of their system or lose it. For victims, it is hard to justify not paying even though it sets a harmful precedent. At heart, this is an economics question that cyber professionals find it difficult to answer on Earth. In space, the steep initial investments, slow times to market and operational costs of satellites and in-orbit infrastructure make the payment of a future ransomware attack against a satellite nearly assured.
RAW MATERIALS RISING
When you work in emerging tech, you get asked for lists.
People want to know what the top 5 or 10 or 50 emerging technologies will be this year and beyond.
The pace of emerging technology development inherently means that any list must be updated or revised before it can be useful to industry executives or government policy makers.
NIST loses key cyber experts in standards and research
Quoted in the article
The head of the agency’s Computer Security Division and roughly a dozen of his subordinates took the Trump administration’s retirement offers, placing key programs at risk. The departures are raising concerns over NIST’s work on emerging technology issues in quantum computing and artificial intelligence.
Barclay Damon Cyber Sip Podcast: Yes, You Can - But Should You? Strategies for Implementing Generative AI
Podcast
The conversation emphasizes the significance of understanding data security, the role of human oversight, and the establishment of AI governance to ensure ethical and effective implementation of AI solutions.
IHS Podcast: How Quantum Computers Could Break the Internet with Nick Reese
Podcast
Listen to Structurally Sound Podcast by IHS at Sam Houston State University. How quantum computers could break the internet.
Why the Signal chat leak might have exposed a big legal problem for Trump administration
Quoted in the article.
Lawmakers and legal experts claim the Yemen Signal group chat ‘blatantly violated security regulations designed to prevent exactly this kind of leak’
Undersea Cables & Starlink: The Hidden Conflicts of Global Connectivity
Global #communication #infrastructure is at the center of a geopolitical battle as nations and corporations strategize for security and control over #underseacables, #satellite networks, and #internet access. With privately owned systems like #Starlink and OneWeb revolutionizing connectivity, security risks, ownership disputes, and the potential for strategic manipulation are key issues in a hyperconnected world.
Risk of State-Sponsored Intellectual Property Theft and Protection
Intellectual property (IP) is a cornerstone of innovation and economic strength, yet it faces growing threats from state-sponsored theft. This paper explores the significance of IP theft for U.S. national security and economic stability, focusing on the legal frameworks, case studies, and methods used by state actors. It provides actionable recommendations for critical infrastructure owners and advisors to mitigate risks and enhance protections.
Are Microsoft and Amazon’s new chips about to unlock quantum computing?
Quoted in the article.
Just one week after Microsoft's announcement of Majorana 1, Amazon made headlines with the release of its Ocelot quantum chip. As the first quantum processor from AWS, the Ocelot chip promises significant advancements, but much like Microsoft’s claims, the press release was filled with bold assertions that still require substantiated evidence.
Elon Musk Points Finger at Ukraine for Cyber Attack on X That Caused Major Outages
Quoted in the article.
Elon Musk has pointed the finger at Ukraine for a major cyber attack on X (formerly Twitter), that caused outages throughout Monday.
Tens of thousands of users reported at least three major outages of the website and app.
The Revenge of Raw Materials
AI’s future is built on rare earth minerals—without them, even the most advanced AI models are just lines of code.
The standoff between raw materials required for advanced technologies and the finished technologies themselves could become an aspect of the upcoming sanctions and tariffs that are likely to be continued features of 2025. History gives us some interesting insights.
Companies are planning to build space critical infrastructure. Can space policy keep up?
Building space policy is hard enough. It’s harder when trying to make a future-focused policy decision based on abstract concepts. That’s really the problem with the space critical infrastructure conversation, isn’t it? When we talk about space services, we look at what we know, which is low Earth orbit (LEO), and services provided from LEO assets to Earth. We talk considerably less about cislunar travel or interplanetary travel even though there are plans for both in the less than distant future. The difference is that one is real today and one is abstract.
What President Biden’s second cybersecurity executive order means for the space economy
In the waning hours of the Biden administration, the Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity, was released. The order is a sweeping opus that covers a variety of topics from space cybersecurity to post-quantum cryptography.
Space ISAC Eyes Cislunar Space for Cyber Preparedness
Quoted in the article
The concept of further advancement in cislunar space has been a topic of discussion for some time—and it only continues to gain momentum. A year-old paper by Col. Charles S. Galbreath, USSF (Ret.) argued for United States military presence in the cislunar environment, citing international rivalry as the “new race to the Moon.”
Attack season
This post explores how a cyberattack against Smart Agriculture systems in strategic areas can cause significant economic, food security, and public trust issues if timed correctly. This outline provides specific guidance for cybersecurity officials in communities with Smart Agriculture to focus on their vulnerabilities and the right time of year when a cyberattack would have maximum impact.
A ‘Newspeak’ world - if generative AI will be used to manipulate, who stands to benefit?
Quoted in the article
In the second of our two-part series, we explore how the AI arms race is actually a race for who controls the narrative - and who will gain the most.
More Spyware, Fewer Rules: What Trump’s Return Means for US Cybersecurity
Quoted in the article.
Experts expect Donald Trump’s next administration to relax cybersecurity rules on businesses, abandon concerns around human rights, and take an aggressive stance against the cyber armies of US adversaries.