The interior of the IBM Quantum System Two is seen at IBM Thomas J. Watson Research Center on June 6, 2025 in Yorktown Heights, New York. A guide aims to help tech buyers navigate their switch to post-quantum encryption, but experts cautioned that most products and backend internet protocols have yet to be updated. (Photo by ANGELA WEISS / AFP) (Photo by ANGELA WEISS/AFP via Getty Images)
A guide aims to help tech buyers navigate their switch to post-quantum encryption, but experts cautioned that most products and backend internet protocols have yet to be…
Retired Lt. Gen. Charlie “Tuna” Moore, former deputy commander of U.S. Cyber Command, joins Safe Mode to break down his new paper on “dominating the digital space”…
WASHINGTON, DC – MARCH 18: A U.S. flag and the flag of the U.S. Department of Energy fly outside its building on March 18, 2025 in Washington, DC. DEK: Under the Trump administration, the Department of Energy’s cybersecurity office is planning to shift focus from “traditional” research and development to “AI dominance.” (Photo by Alex Wong/Getty Images)
A Trump administration official endorsed a slate of congressional bills Tuesday targeting cybersecurity in the energy sector while touting the office’s new emphasis on AI-driven cyber defenses.…
Talha Tariq quickly found his company at the center of a fast-moving, high-stakes mitigation effort. The result: a bounty program, a cat-and-mouse patch fight, and a debate…
There are legal tools in place to curb what’s happening on X, but the incident will be precedent-setting for how these laws and regulations are wielded for…
DEK: The regulations, put in place after President Joe Biden’s voice was cloned, imposes $10,000 fines on telecoms that file false or late caller information. (Image Credit: Getty Images)
The regulations, put in place after President Joe Biden’s voice was cloned, imposes $10,000 fines on telecoms that file false or late caller information.
The effort includes a new research center that will bring government and industry experts together to study how AI will impact cybersecurity in critical infrastructure.