four individuals and a hand holding a mobile phone, illustration - Credit: DesignPrax

Coalition of the Willing Takes Aim at COVID-19

Though privacy concerns limit the quantity of information they will be able to use, as the pandemic gradually clears, researchers will have data from the most closely tracked outbreak of its kind to gauge the effectiveness of the many strategies countries have used to tackle Covid-19. But the pandemic has reinforced the notion that there are limits to what data science can achieve, despite the clear cost-savings and efficiency that technology promises.

Read More
Credit: Shutterstock

Cybersecurity Research for the Future

Nonetheless, while the dark side is daunting, emerging research, development, and education across interdisciplinary topics addressing cybersecurity and privacy are yielding promising results. The shift from R&D on siloed add-on security, to new fundamental research that is interdisciplinary, and positions privacy, security, and trustworthiness as principal defining objectives, offer opportunities to achieve a shift in the asymmetric playing field.

Read More
neurons and lighted background, illustration - Credit: Andrii Vodolazhskyi

Insights for AI from the Human Mind

Much work in evolutionary and developmental psychology points in the same direction; the mind is not one thing, but many.
To build AIs able to comprehend open text or power general-purpose domestic robots, we need to go further. A good place to start is by looking at the human mind, which still far outstrips machines in comprehension and flexible thinking.

Read More
Logo - The White House - Barack Obama

Presidential Policy Directive 41 – United States Cyber Incident Coordination

While the vast majority of cyber incidents can be handled through existing policies, certain cyber incidents that have significant impacts on an entity, our national security, or the broader economy require a unique approach to response efforts. These significant cyber incidents demand unity of effort within the Federal Government and especially close coordination between the public and private sectors.

Read More
Nakasone testifying in Washington, D.C., February 2019 - U.S. Cyber Command

How to Compete in Cyberspace

We learned that we cannot afford to wait for cyber attacks to affect our military networks. We learned that defending our military networks requires executing operations outside our military networks. The threat evolved, and we evolved to meet it.

Read More
hand turning knobs on console - Credit: Getty Images

Why Is Cybersecurity Not a Human-Scale Problem Anymore?

In this Viewpoint, we show why cybersecurity is a very difficult problem. The enterprise attack surface is massive and growing rapidly. There are practically unlimited permutations and combinations of methods by which an adversary can attack and compromise our networks. There is a big gap between our current tools and methods, and what is needed to get ahead of cyber-adversaries.

Read More
one arrow pointing up, another pointing down - Credit: Getty Images

Above the Line, Below the Line

All these features [of Internet-facing systems] are simultaneously products of the environment and enablers of it. They have emerged in large part because the technical artifacts are evolving quickly, but moreso because the artifacts cannot be observed or manipulated directly. Computing is detectable only via representations synthesized to show its passing. Similarly, it can be manipulated only via representations.

Read More