Security that slows productivity is a burden. It won’t survive. If your model assumes people will tolerate friction ...
The third annual gathering of the cyber policy community recognizes and celebrates those who drove significant progress ...
The rapid evolution of security technology over the past decade has been driven in large part by significant investment from private industry and private equity firms. These investors see a growing ...
UNIONTOWN, Ohio—Securitas Technology has released its 2026 Global Technology Outlook Report on the state of security technology and the trends shaping the future of security investments over the ...
I recently had the privilege of speaking at a higher education security conference — an experience that felt a lot like coming home. This community is where I got my start in the security industry.
When organizations focus on building trust through performance and reliability, they create security systems that teams can ...
The Tech Edge Project is the Economic Security and Technology (EST) Department’s flagship initiative on U.S.–China technology competition. It introduces a new framework for assessing the ecosystem ...
Modern and powerful security technology that protects against hacking attempts is used to a very limited extent—despite having been available to developers for more than a decade. Researchers at Umeå ...
When schools have little budget to spare for security concerns, demonstrating its value is critical. Prevention is a difficult commodity to price, so administrators must learn how to effectively ...
WASHINGTON, DC – December 15, 2025 – The Center for Strategic and International Studies (CSIS) today announced that Angela Paolini Ellard has been appointed as non-resident senior adviser with the ...
23 finalists are in contention to receive The Atlas award, chosen by an august panel of judges from across the cyber community Hosted by the Institute for Security and Technology, the Cyber Policy ...
Seven individuals and organizations have been awarded the Atlas trophy for outstanding contributions to cyber policy at the Third Annual Cyber Policy Awards™ gala. These prestigious awards honor those ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results