Luke Penn-Hall

The Tech Must Flow

Although often hamstrung by bureaucratic inefficiency, the U.S. government has achieved considerable success in the field of scientific research. In fact, many indispensible products have […] More

The Cloud: Nebulous, but Nimble

When it comes to Silicon Valley buzzwords, “the cloud” is one of the most ubiquitous and one of the most misunderstood. The cloud is essentially […] More

The Darker Side of the Internet of Things

On Friday, Dyn, a company that routes and manages internet traffic, suffered multiple Distributed Denial of Service (DDoS) attacks throughout the day.  Major sites such […] More

APTs: The Boogeymen of Cybersecurity

Dark Hotel, Crouching Yeti, Machete, Sofacy, Sandworm – what do these words have in common? They are all names given to hacker groups that have […] More

Are America's Ports Secure?

With fifty percent of U.S. imports travelling by sea, ensuring that ships have a secure place to dock poses a challenge to American law enforcement. […] More

Taking Aim at Smart Guns

In the wake of a series of high-profile mass shootings, President Barack Obama initiated an executive action directing the Department of Defense, the Department of […] More

Healthcare and the Cyber Threat

In February, Hollywood Presbyterian Hospital very publicly paid $17,000 to regain access to its files after being infected with a type of malware called ransomware. […] More

The Rise of Counter-Drone Technology

Commercially available unmanned aerial vehicles (UAVs), popularly known as drones, appear to be changing the game in regards to aviation. The market for drones has […] More

The Rise of Quantum Computing

Apple’s dispute with the FBI has caused a resurgence of the debate about encryption in the United States, but the tech industry is working on […] More

The Cybersecurity Skills Shortage

There is a massive problem in cybersecurity, and it has been growing for years. This problem is not a malicious program, or a rogue nation-state, […] More

Securing Industrial Control Systems

A serious, potential malware threat has been detected on the systems that control many aspects of critical infrastructure in the United States.  These industrial control […] More

The End of U.S. Space Supremacy

Space may be infinite, but it’s starting to get crowded around Earth. As more nations have gained the ability to send assets into orbit, a […] More

Search

Close