Recent advances in generative artificial intelligence (AI) have captured the public’s attention and sparked a widespread debate about how the government should regulate this powerful technology. A variety of policy…
Learn MoreArctic climate change continues to impact the region’s environmental, social, cultural, political, economic, and security landscapes. The repercussions have drawn more attention to the Arctic, highlighting its inherent value and…
Learn MoreOn both terrestrial and non-terrestrial planets and the space between, human technology thrives using a well-known power: solar energy. This executive briefing probes photovoltaic technologies used in space exploration, highlighting…
Learn MoreTo address cybersecurity challenges organizations may face, the National Cybersecurity Center of Excellence collaborates with government agencies, organizations, and academic institutions to emphasize the importance of implementing Zero Trust Architecture.…
Learn MoreThe U.S. is one of the top consumers of textiles in the world, and clothing brands produce approximately twice the amount of clothing today compared to two decades ago. Driven…
Learn MoreZero Trust (ZT) is an “evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources.” Unlike a traditional perimeter-based network security…
Learn MoreOperating system (OS) command injection vulnerabilities are a preventable class of vulnerability in software products. Software manufacturers can eliminate them at the source by taking a secure by design approach.…
Learn MoreRemote sensing has a long history in the United States, but a relatively short commercial one. The 2020 National Space Policy explicitly states “that long-term United States national security and…
Learn MoreWhile realizing the full potential of many quantum technologies may still be years away, tech development is rapidly progressing, promising to unlock new capabilities across various applications and industries. For…
Learn MoreGovernments are under more pressure to secure the election process than ever before. Disinformation can spread like wildfire amidst the endless back and forth of cyberespionage campaigns from other nation…
Learn MoreHExCAT is an explosive hazard modeling tool that estimates the potential impact and consequences of an explosion, including severity and types of injures, effectiveness of response, choke points and building…
Learn MoreWhile artificial intelligence (AI) has the potential to deliver transformative solutions for U.S. critical infrastructure, the introduction of AI systems into critical infrastructure has the potential to make those systems…
Learn MoreThe question of how to govern artificial intelligence (AI) is rightfully top of mind for U.S. lawmakers and policymakers alike. Strides in the development of high-powered large language models like…
Learn MoreResearch and Experimental Development (R&D) refers to creative and systematic work aimed at increasing the stock of knowledge and is broken down into three categories: basic research, applied research, and…
Learn MoreCybersecurity is a top priority of this Administration. In May 2021, President Biden issued Executive Order 14028, Improving the nation’s Cybersecurity, which makes a significant contribution towards the modernization of…
Learn More