Computer security

April 15, 2026 | RADM (Ret.) Mark Montgomery, Jack Burnham

The Risks of Chinese-Produced Cellular Modules

April 10, 2026 | Jiwon Ma, Johanna Yang

Audit Finds Federal Aviation Administration Delinquent in Cybersecurity Practices

For years, America’s air traffic has run on systems the federal government knows are not secure. The Department of Transportation’s (DOT’s) Office of the Inspector General (OIG) has published an...

April 9, 2026 | Dr. Georgianna Shea |

From Static Inventory to Real-Time Defense: Why the SBOM conversation has to change now

When the next widely exploitable vulnerability appears, your organization will have far less time to respond than the processes you have built were designed to handle. That is not a prediction. It is what...

April 8, 2026 | Jack Burnham |

The American AI Sector Bands Together To Stop Chinese Theft

China’s effort to steal American artificial intelligence (AI) has begun to turn foes into friends. Three American AI firms locked in an intense competition for market share — OpenAI, Anthropic,...

April 6, 2026 | Sophie McDowall, Thomas Gormley

New Standards Aim to Protect Medical Patients from the ‘Internet of Things’

Cybersecurity in healthcare may finally be getting its overdue visit to the doctor’s office. The National Institute of Standards and Technology (NIST) is developing new cybersecurity guidance for...

March 27, 2026 | Sophie McDowall, RADM (Ret.) Mark Montgomery

Trump’s Cyber Strategy Is a Strong Playbook, but It’s All in the Execution

The White House is making a significant effort toward putting the nation’s cyber house in order. A newly released National Cyber Strategy represents a big step in the right direction for U.S. national...

March 27, 2026 | Emmerson Overell |

Houston, Americans Are Headed Back to the Moon 

“America will never again give up the moon,” NASA Administrator Jared Isaacman stated on March 24 as he announced a $20 billion investment to build a lunar base over the next seven years. The moon...

March 23, 2026 | Chuck Brooks, Dr. Georgianna Shea

Cryptography Bill of Materials (CBOM): Why Every Encryption Ecosystem Needs One – and Fast

We’ve learned the hard way that knowing what’s in your software supply chain matters. The Software Bill of Materials (SBOM) progressed from a niche best practice to government regulation  codified...

March 17, 2026 | Jack Burnham, RADM (Ret.) Mark Montgomery, Craig Singleton, Johanna Yang

Petition for Reconsideration of Action in Rulemaking Proceeding Application for Review of Action in Rulemaking Proceeding

March 9, 2026 | Leah Siskind, Dr. Georgianna Shea, Marina Chernin

Regarding Security Considerations for Artificial Intelligence Agents

October 23, 2025 | Ivana Stradner, Emily Hester

The UN Cybercrime Treaty: A Trojan Horse for Suppressing Dissent

June 17, 2025 | Nick Leiserson |

How a Government Reinsurance Program Can Accelerate Maturation of the Cyber Insurance Market

...

May 15, 2025 | RADM (Ret.) Mark Montgomery |

Deterrence Amid Rising Tensions

Preventing CCP Aggression on Taiwan

March 5, 2025 | Craig Singleton |

Countering Threats Posed by the Chinese Communist Party to U.S. National Security

January 22, 2025 | RADM (Ret.) Mark Montgomery |

Unconstrained Actors

Assessing Global Cyber Threats to the Homeland

October 22, 2024 | Frank Cilluffo, RADM (Ret.) Mark Montgomery, George Barnes, Joshua Whitman

Securing America’s Digital Future

A Bipartisan Cybersecurity Roadmap for the Next Administration

March 25, 2024 | Dr. Erica Lonergan, RADM (Ret.) Mark Montgomery

United States Cyber Force

A Defense Imperative

February 15, 2024 | Craig Singleton |

Securing Communications Networks from Foreign Adversaries

November 17, 2023 | Dr. Georgianna Shea |

Charting FDA’s Course: SBOM as the North Star in Cybersecurity

Supply chain security has undergone a profound transformation after pivotal events such as the SolarWinds compromise in 2020 and the subsequent Log4j incident.  Central to this evolution is the emergence...

July 27, 2023 | RADM (Ret.) Mark Montgomery, Annie Fixler

Building Partner Capabilities for Cyber Operations