Computer security
Audit Finds Federal Aviation Administration Delinquent in Cybersecurity Practices
For years, America’s air traffic has run on systems the federal government knows are not secure. The Department of Transportation’s (DOT’s) Office of the Inspector General (OIG) has published an...
Policy Briefs
From Static Inventory to Real-Time Defense: Why the SBOM conversation has to change now
When the next widely exploitable vulnerability appears, your organization will have far less time to respond than the processes you have built were designed to handle. That is not a prediction. It is what...
Op-eds
The American AI Sector Bands Together To Stop Chinese Theft
China’s effort to steal American artificial intelligence (AI) has begun to turn foes into friends. Three American AI firms locked in an intense competition for market share — OpenAI, Anthropic,...
Policy Briefs
New Standards Aim to Protect Medical Patients from the ‘Internet of Things’
Cybersecurity in healthcare may finally be getting its overdue visit to the doctor’s office. The National Institute of Standards and Technology (NIST) is developing new cybersecurity guidance for...
Policy Briefs
Trump’s Cyber Strategy Is a Strong Playbook, but It’s All in the Execution
The White House is making a significant effort toward putting the nation’s cyber house in order. A newly released National Cyber Strategy represents a big step in the right direction for U.S. national...
Op-eds
Houston, Americans Are Headed Back to the Moon
“America will never again give up the moon,” NASA Administrator Jared Isaacman stated on March 24 as he announced a $20 billion investment to build a lunar base over the next seven years. The moon...
Policy Briefs
Cryptography Bill of Materials (CBOM): Why Every Encryption Ecosystem Needs One – and Fast
We’ve learned the hard way that knowing what’s in your software supply chain matters. The Software Bill of Materials (SBOM) progressed from a niche best practice to government regulation codified...
Op-eds
Petition for Reconsideration of Action in Rulemaking Proceeding Application for Review of Action in Rulemaking Proceeding
Public Comments
Regarding Security Considerations for Artificial Intelligence Agents
Public Comments
The UN Cybercrime Treaty: A Trojan Horse for Suppressing Dissent
Memos
How a Government Reinsurance Program Can Accelerate Maturation of the Cyber Insurance Market
...
Memos
Deterrence Amid Rising Tensions
Preventing CCP Aggression on Taiwan
Legislative Testimonies
Countering Threats Posed by the Chinese Communist Party to U.S. National Security
Legislative Testimonies
Unconstrained Actors
Assessing Global Cyber Threats to the Homeland
Legislative Testimonies
Securing America’s Digital Future
A Bipartisan Cybersecurity Roadmap for the Next Administration
Memos
United States Cyber Force
A Defense Imperative
Monographs
Securing Communications Networks from Foreign Adversaries
Legislative Testimonies
Charting FDA’s Course: SBOM as the North Star in Cybersecurity
Supply chain security has undergone a profound transformation after pivotal events such as the SolarWinds compromise in 2020 and the subsequent Log4j incident. Central to this evolution is the emergence...