The United States is entering a new phase of robotics policy—one that pairs industrial ambition with national security ...
As we head into 2026, I believe innovation will be driven by three main shifts: the reshaping of traffic flows through ...
Wars today do not always start with soldiers on a battlefield. More often, they begin in silence through cyberattacks, surveillance tools, and software that makes choices before humans even know a ...
Continuing our three-part analysis of the homeland security landscape, Homeland Security Today now presents Part II of the Threat Forecast for 2026.
October 03, 2025 - The term "dual-use technology" refers to innovation with both civilian and military applications. For decades, the epicenter of this innovation was unmistakably American. From DARPA ...
Securitas Technology has released its 2026 Global Technology Outlook Report, providing a data-rich analysis of the technologies, strategies and business drivers shaping investment in the electronic ...
By integrating human expertise with layered technology and clear performance expectations, CEOs can position their businesses ...
The rapid evolution of security technology over the past decade has been driven in large part by significant investment from private industry and private equity firms. These investors see a growing ...
I recently had the privilege of speaking at a higher education security conference — an experience that felt a lot like coming home. This community is where I got my start in the security industry.
Researchers point to technologies addressing GenAI-enabled code architecture, disinformation security and surface asset management as the most likely to be widely adopted by businesses by 2030, while ...
At Black Hat 2025, HPE showcases new data protection capabilities, SASE copilot, and a unified portfolio following its Juniper Networks acquisition. HPE has unveiled a secure access service edge (SASE ...
23 finalists are in contention to receive The Atlas award, chosen by an august panel of judges from across the cyber community Hosted by the Institute for Security and Technology, the Cyber Policy ...