Sean Plankey, of Pennsylvania, responds to questioning during Senate Committee on Homeland Security and Governmental Affairs hearings to examine his nomination to be Director of the Cybersecurity and Infrastructure Security Agency, of the Department of Homeland Security, in the Dirksen Senate office building, in Washington, DC, on Wednesday July 24, 2025. (Mattie Neretin/CNP/Sipa USA)
As traditional fraud markers become obsolete, we must treat digital identity as critical infrastructure and adopt a layered, real-time defense to neutralize sophisticated crime rings.
Quantum computing promises a revolution in science, but it also signals the end of current security standards. Here is why enterprises must transition to post-quantum cryptography before…
The executive order finally calls cyber-enabled fraud what it is: transnational organized crime. Now the U.S. has to act like it—and the private sector has to stop…
The latest executive order pushes Washington to crack down on cyber fraud, but a different mandate eases software security accountability, leaving an inconsistent strategy that keeps the…
Hackers have cut their attack timelines from weeks to hours while the government spreads resources too thin. We need to stop pretending we can protect everything and…
Silent probing uses AI to measure your team’s response patterns over time, building a behavioral profile that makes follow-on attacks harder to spot and easier to time.
Construction on an Oncor electricity power plant by the new Skybox Power Campus data colocation center in North Austin, Texas. Cybersecurity must be table stakes as the data center boom continues, this op-ed argues. (Getty Images)