National Cybersecurity Strategy compliance requires a modernized cloud

National Cybersecurity Strategy compliance requires a modernized cloud

A year removed from the delivery of the Biden Administration’s National Cybersecurity Strategy, federal agencies continue working to mature their IT architectures to comply with enhanced standards for cloud modernization. Fortunately, these new federal mandates on what had previously been recommended guidelines are driving agencies in a direction they should be going anyway – toward …

Read more

North Korean Hackers Employ Generative AI for Cyberattacks

North Korean Hackers Employ Generative AI for Cyberattacks

North Korean hackers are using generative artificial intelligence (AI) solutions to identify targets and facilitate digital assaults, according to Seoul’s spy agency. Generative AI produces different types of data based on models and information it has learned with minimal to no human intervention. South Korea’s National Intelligence Service (NIS) said that its government is now …

Read more

Optical communications, i.e. lasers, are the network pipes for the Internet of Space

Optical communications, i.e. lasers, are the network pipes for the Internet of Space

Kepler recently launched two optical Pathfinder satellites equipped with not only its RF payloads but also two optical communications terminals compatible with the SDA’s constellation. (Illustration courtesy of Kepler Communications.) In this Q&A with Robert Conrad, Vice President of U.S. Business Development for Kepler Communications US, we discuss: Kepler’s Space Development Agency (SDA)-compliant space data …

Read more

Securing the Artificial Intelligence Supply Chain May Require an Abundance of AI

Securing the Artificial Intelligence Supply Chain May Require an Abundance of AI

For Fowler, unsupervised learning, if the context permits, is the way to stop malicious interference. Still, this AI protects AI applications—and the systems linked to them—without the risks of starting from a data set. In line with Fowler’s view, federal agencies, in coordination with the Information Technology Sector Coordinating Council, call for the adoption of …

Read more

New tactics urged for quantum computing

New tactics urged for quantum computing

From left are Mr Chalee, Mr Ponsarn, AVM Amorn, Mr Sarun and Mr Soontorn at a recent press conference. Technology advisors are pushing organisations to adopt the post-quantum cryptography (PQC) approach to remain secure against attacks by quantum computers. PQC refers to the development of cryptographic algorithms that are thought to be able to provide …

Read more

Apple releases urgent iOS security update: ‘Recommended for all users’

Apple releases urgent iOS security update: ‘Recommended for all users’

Tech By Timothy Nerozzi , Fox Business Published Dec. 2, 2023, 8:04 p.m. ET Tech giant Apple has released another update for iOS, just weeks after dropping the landmark 17.1.1.  iOS 17.1.2 was made available to the public on Nov. 30 and aims to patch two possible security exploits documented in 17.1.1.  “This update provides important security fixes …

Read more