National Institute of Standards and Technology

November 26, 2025 | Jack Burnham, Leah Siskind

DeepSeek May Intentionally Produce Malicious Code Due to Chinese Political Bias, Research Shows

China’s top artificial intelligence (AI) models don’t simply follow the Communist Party line — they act on it. On November 20, the cybersecurity firm CloudStrike published a study suggesting that...

November 25, 2025 | Jack Burnham, Duncan Lazarow

Chinese Electric Buses Trigger Cybersecurity Alarm Across Europe

China’s reach into critical infrastructure threatens to disrupt Europeans’ daily commute. On November 19, The Wall Street Journal reported that the Oslo transportation authority, working in conjunction...

November 18, 2025 | Jack Burnham, Craig Singleton, Leah Siskind

American AI Exports Program

November 10, 2025 | Jack Burnham, Duncan Lazarow

Signaling Confidence in Its Domestic Industry, China Bans Foreign AI Chips in State-Funded Data Centers

China is pulling away from the United States to complete its own artificial intelligence (AI) ecosystem. Following a ceasefire with the United States over export controls, China is signaling its intention...

October 7, 2025 | Jack Burnham |

New Major Study Suggests DeepSeek Still Lags Behind Top American Models and Presents Major Security Flaws

In a head-to-head matchup over the future of artificial intelligence (AI), the United States appears to be winning — for now. On September 30, the Center for AI Standards and Innovation at the National...

September 9, 2025 | Jack Burnham |

Looking for an Edge in Trade Talks, Chinese Hackers Go Phishing Against Key House Committee

The chairman of the House China Select Committee and an outspoken critic of Beijing, Rep. John Moolenaar (R-MI), appeared to be soliciting input about upcoming U.S.-China trade talks from Capitol Hill...

September 1, 2025 | Jack Burnham, Annie Fixler

China Is Winning the AI Race With America’s Own Manhattan Project Lessons

China is applying the real lessons of the Manhattan Project to AI—talent and steady research funding—while America risks forgetting its own blueprint.

July 29, 2025 | Jiwon Ma, Meera Hatangadi

The Global Cyber Vulnerability Database Cannot Run on Unstable Funding

A critical cybersecurity system that supports global threat coordination operates without guaranteed funding, statutory authority, or a formal governance structure. The Common Vulnerabilities and Exposures...

June 30, 2025 | Jack Burnham, Johanna Yang

Chinese Scholars Probe for Weaknesses in Western Electricity Grids

Chinese academics are taking a keen interest in the vulnerabilities of America’s energy grid. On June 19, the Czech Technical University in Prague published a paper revealing that Chinese scholars are...

June 25, 2025 | Dr. Georgianna Shea, Elaine Ly

Generative AI Exacerbates Software Supply Chain Risks

Malicious actors are exploiting AI-fabricated software components — presenting a major challenge for securing software supply chains.

June 17, 2025 | Nick Leiserson |

How a Government Reinsurance Program Can Accelerate Maturation of the Cyber Insurance Market

...

June 3, 2025 | Jack Burnham |

China Races Ahead in Biotech Trials. Is the U.S. Stuck in Second Place?

Fentanyl fears have played a significant role in U.S.-Chinese trade disputes, but soon legal drugs could be a greater threat from China. On May 29, Axios reported that China had surpassed the United States...

May 28, 2025 | Jack Burnham |

Following Pause in Trade Talks With the U.S., China Reportedly Prepares New Industrial Policy

After a decade of accelerated industrialization, China is preparing to go for another round. On May 26, Bloomberg reported that Chinese paramount leader Xi Jinping is currently considering relaunching...

May 7, 2025 | Jack Burnham |

New Report Finds Beijing Has Successfully Achieved ‘Made in China 2025’ Policy Goals, Catching Up to the U.S.

With summer arriving, Beijing has received its latest report card. On April 5, the U.S. Chamber of Commerce issued an analysis on the state of Made in China 2025 (MIC25) — Beijing’s premier industrial...

April 29, 2025 | Dr. Georgianna Shea |

The Pentagon must balance speed with safety as it modernizes software

The Department of Defense is at grave risk of being caught flat-footed by the next software vulnerability. When an adversary discovers it, the Pentagon may not know which systems are exposed until substantial...

April 21, 2025 | Jack Burnham, Johanna Yang

Probing DeepSeek’s Success, House Select Committee on China Opens Investigation into Nvidia

The United States is expanding its efforts to stymie the rise of China’s technology sector. On April 16, the House Select Committee on the Chinese Communist Party (CCP) opened an investigation into Nvidia’s...

April 16, 2025 | Jiwon Ma, Rohannah Shrestha 

Cutting NIST’s Workforce Threatens American Tech Innovation and Leadership

America’s technology prowess is built on its people, but Washington is terminating many of the researchers and engineers driving U.S. progress in AI, quantum technology, advanced manufacturing, and semiconductors....

April 14, 2025 | RADM (Ret.) Mark Montgomery, Craig Singleton, Jack Burnham, Annie Fixler

Review of Submarine Cable Landing License Rules and Procedures To Assess Evolving National Security, Law Enforcement, Foreign Policy, and Trade Policy Risks; Schedule of Application Fees

March 21, 2025 | Jiwon Ma |

Delayed Vulnerability Analysis Puts America at a Cybersecurity Disadvantage

The National Institute of Standards and Technology (NIST) is struggling. It faces a growing backlog to process data in its vulnerability repository, which publicly shares information assessing and detailing...

March 13, 2025 | Alison King, Annie Fixler, RADM (Ret.) Mark Montgomery

US must prioritize cybersecurity training for the military’s engineers

The Defense Department faces a startling capability gap.