National Institute of Standards and Technology

April 10, 2026 | Jiwon Ma, Johanna Yang

Audit Finds Federal Aviation Administration Delinquent in Cybersecurity Practices

For years, America’s air traffic has run on systems the federal government knows are not secure. The Department of Transportation’s (DOT’s) Office of the Inspector General (OIG) has published an...

April 6, 2026 | Sophie McDowall, Thomas Gormley

New Standards Aim to Protect Medical Patients from the ‘Internet of Things’

Cybersecurity in healthcare may finally be getting its overdue visit to the doctor’s office. The National Institute of Standards and Technology (NIST) is developing new cybersecurity guidance for...

March 23, 2026 | Chuck Brooks, Dr. Georgianna Shea

Cryptography Bill of Materials (CBOM): Why Every Encryption Ecosystem Needs One – and Fast

We’ve learned the hard way that knowing what’s in your software supply chain matters. The Software Bill of Materials (SBOM) progressed from a niche best practice to government regulation  codified...

March 9, 2026 | Leah Siskind, Dr. Georgianna Shea, Marina Chernin

Regarding Security Considerations for Artificial Intelligence Agents

February 20, 2026 | Leah Siskind, Jack Burnham

Eyeing China’s Growth, NIST Launches New Standards Initiative for AI Agents

Washington is seeking to place artificial intelligence (AI) agents at the center of American technology dominance. On February 17, the National Institute for Standards and Technology (NIST) launched the...

February 13, 2026 | Jack Burnham |

OpenAI Alleges China’s DeepSeek Stole its Intellectual Property to Train its Own Models

One year on from DeepSeek’s first major release, Washington is probing deeper into the Chinese artificial intelligence firm’s unexpected success. The U.S. AI firm OpenAI publicly released a memo...

December 22, 2025 | Jack Burnham, Dr. Georgianna Shea, RADM (Ret.) Mark Montgomery, Craig Singleton

Accelerating the American Scientific Enterprise

November 26, 2025 | Jack Burnham, Leah Siskind

DeepSeek May Intentionally Produce Malicious Code Due to Chinese Political Bias, Research Shows

China’s top artificial intelligence (AI) models don’t simply follow the Communist Party line — they act on it. On November 20, the cybersecurity firm CloudStrike published a study suggesting that...

November 25, 2025 | Jack Burnham, Duncan Lazarow

Chinese Electric Buses Trigger Cybersecurity Alarm Across Europe

China’s reach into critical infrastructure threatens to disrupt Europeans’ daily commute. On November 19, The Wall Street Journal reported that the Oslo transportation authority, working in conjunction...

November 18, 2025 | Jack Burnham, Craig Singleton, Leah Siskind

American AI Exports Program

November 10, 2025 | Jack Burnham, Duncan Lazarow

Signaling Confidence in Its Domestic Industry, China Bans Foreign AI Chips in State-Funded Data Centers

China is pulling away from the United States to complete its own artificial intelligence (AI) ecosystem. Following a ceasefire with the United States over export controls, China is signaling its intention...

October 7, 2025 | Jack Burnham |

New Major Study Suggests DeepSeek Still Lags Behind Top American Models and Presents Major Security Flaws

In a head-to-head matchup over the future of artificial intelligence (AI), the United States appears to be winning — for now. On September 30, the Center for AI Standards and Innovation at the National...

September 9, 2025 | Jack Burnham |

Looking for an Edge in Trade Talks, Chinese Hackers Go Phishing Against Key House Committee

The chairman of the House China Select Committee and an outspoken critic of Beijing, Rep. John Moolenaar (R-MI), appeared to be soliciting input about upcoming U.S.-China trade talks from Capitol Hill...

September 1, 2025 | Jack Burnham, Annie Fixler

China Is Winning the AI Race With America’s Own Manhattan Project Lessons

China is applying the real lessons of the Manhattan Project to AI—talent and steady research funding—while America risks forgetting its own blueprint.

July 29, 2025 | Jiwon Ma, Meera Hatangadi

The Global Cyber Vulnerability Database Cannot Run on Unstable Funding

A critical cybersecurity system that supports global threat coordination operates without guaranteed funding, statutory authority, or a formal governance structure. The Common Vulnerabilities and Exposures...

June 30, 2025 | Jack Burnham, Johanna Yang

Chinese Scholars Probe for Weaknesses in Western Electricity Grids

Chinese academics are taking a keen interest in the vulnerabilities of America’s energy grid. On June 19, the Czech Technical University in Prague published a paper revealing that Chinese scholars are...

June 25, 2025 | Dr. Georgianna Shea, Elaine Ly

Generative AI Exacerbates Software Supply Chain Risks

Malicious actors are exploiting AI-fabricated software components — presenting a major challenge for securing software supply chains.

June 17, 2025 | Nick Leiserson |

How a Government Reinsurance Program Can Accelerate Maturation of the Cyber Insurance Market

...

June 3, 2025 | Jack Burnham |

China Races Ahead in Biotech Trials. Is the U.S. Stuck in Second Place?

Fentanyl fears have played a significant role in U.S.-Chinese trade disputes, but soon legal drugs could be a greater threat from China. On May 29, Axios reported that China had surpassed the United States...

May 28, 2025 | Jack Burnham |

Following Pause in Trade Talks With the U.S., China Reportedly Prepares New Industrial Policy

After a decade of accelerated industrialization, China is preparing to go for another round. On May 26, Bloomberg reported that Chinese paramount leader Xi Jinping is currently considering relaunching...