Search
Close this search box.

Education

The D2U model categorizes user data by capturing behavior in all open programs throughout a user’s day. Courtesy: Nathan Armistead/ORNL, U.S. Dept. of Energy

ORNL cybersecurity put to the test

Oak Ridge National Laboratory (ORNL) researchers have created a technology that more realistically emulates user activities to improve cyber testbeds and ultimately prevent cyberattacks. The Data Driven User Emulation, or D2U, uniquely uses machine learning to […]

This image shows a team of robots collaborating to search for and then retrieve lost objects. The use of blockchain technology could enable secure, tamper-proof communication among the robots as they complete their task, according to new research from MIT. Courtesy: Massachusetts Institute of Technology

Using blockchain technology to protect robots

Imagine a team of autonomous drones equipped with advanced sensing equipment, searching for smoke as they fly high above the Sierra Nevada mountains. Once they spot a wildfire, these leader robots relay directions to a swarm […]

Courtesy: QG Media

CS4CA USA Summit launches virtually on September 16 and 17

The Cyber Security for Critical Assets Summit (CS4CA) will bring together hundreds of information technology (IT) and operational technology (OT) security leaders from across U.S. critical infrastructure for two days of strategy planning, insight building […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Six key takeaways from Black Hat USA 2021

In early August, the industry’s largest hybrid event – Black Hat USA 2021 – took place online and at the Mandalay Bay Convention Center in Las Vegas. The event, which highlighted the latest security trends […]

The D2U model categorizes user data by capturing behavior in all open programs throughout a user’s day. Courtesy: Nathan Armistead/ORNL, U.S. Dept. of Energy

ORNL cybersecurity put to the test

Oak Ridge National Laboratory (ORNL) researchers have created a technology that more realistically emulates user activities to improve cyber testbeds and ultimately prevent cyberattacks. The Data Driven User Emulation, or D2U, uniquely uses machine learning to […]

This image shows a team of robots collaborating to search for and then retrieve lost objects. The use of blockchain technology could enable secure, tamper-proof communication among the robots as they complete their task, according to new research from MIT. Courtesy: Massachusetts Institute of Technology

Using blockchain technology to protect robots

Imagine a team of autonomous drones equipped with advanced sensing equipment, searching for smoke as they fly high above the Sierra Nevada mountains. Once they spot a wildfire, these leader robots relay directions to a swarm […]

Courtesy: QG Media

CS4CA USA Summit launches virtually on September 16 and 17

The Cyber Security for Critical Assets Summit (CS4CA) will bring together hundreds of information technology (IT) and operational technology (OT) security leaders from across U.S. critical infrastructure for two days of strategy planning, insight building […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Six key takeaways from Black Hat USA 2021

In early August, the industry’s largest hybrid event – Black Hat USA 2021 – took place online and at the Mandalay Bay Convention Center in Las Vegas. The event, which highlighted the latest security trends […]

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES