#national-security-policy

[ follow ]
fromwww.theguardian.com
3 hours ago

Do stronger borders ever work?

The world's first border wall, built by a Sumerian king, now lies buried beneath Iraq's desert sands, illustrating the futility of such constructions.
History
#cybersecurity
Careers
fromEntrepreneur
1 day ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
Information security
fromThe Hacker News
1 day ago

CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

CISA added four vulnerabilities to its KEV catalog, indicating active exploitation affecting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link routers.
Information security
fromSecurityWeek
1 day ago

In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device

Key cybersecurity developments include a hacker's probation, UK military deployment for internet protection, and Lovable's data exposure issue.
Careers
fromEntrepreneur
1 day ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
Privacy professionals
fromThe Hacker News
1 day ago

NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software

A Chinese national impersonated U.S. researchers to obtain sensitive information from NASA and other entities, violating export control laws.
Information security
fromThe Hacker News
1 day ago

CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

CISA added four vulnerabilities to its KEV catalog, indicating active exploitation affecting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link routers.
Information security
fromSecurityWeek
1 day ago

In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device

Key cybersecurity developments include a hacker's probation, UK military deployment for internet protection, and Lovable's data exposure issue.
#trump
Washington DC
fromwww.aljazeera.com
2 hours ago

Timeline: Trump assassination attempts and security incidents

Trump has faced multiple security incidents, including an armed attack at the White House Correspondent's Dinner and a shooting at a campaign rally.
Washington DC
fromwww.aljazeera.com
2 hours ago

Timeline: Trump assassination attempts and security incidents

Trump has faced multiple security incidents, including an armed attack at the White House Correspondent's Dinner and a shooting at a campaign rally.
US Elections
fromFortune
16 hours ago

U.S. Air Force, Navy plan to boost F-35 fleet after record budget | Fortune

The Air Force and Navy plan to increase F-35 purchases despite criticism and budget challenges.
France politics
fromwww.theguardian.com
19 hours ago

Macron says EU's mutual defence clause not just words'

Emmanuel Macron emphasizes Europe's self-defense capability through a mutual assistance clause in the EU treaty, asserting its strength over NATO's article 5.
#national-security
Europe news
fromSecuritymagazine
2 days ago

Netherlands Faces Greatest National Security Threat Since World War Two

The Netherlands faces its greatest national security threat since World War Two, primarily from Russia and China.
World politics
fromThe Cipher Brief
1 month ago

National Security Starts at Home - Not on the Battlefield

National security relies on enduring internal capacity rather than just accumulated hard power or visible instruments of power.
Europe news
fromSecuritymagazine
2 days ago

Netherlands Faces Greatest National Security Threat Since World War Two

The Netherlands faces its greatest national security threat since World War Two, primarily from Russia and China.
World politics
fromThe Cipher Brief
1 month ago

National Security Starts at Home - Not on the Battlefield

National security relies on enduring internal capacity rather than just accumulated hard power or visible instruments of power.
fromFortune
16 hours ago

SpaceX, Anduril among companies to win Golden Dome contracts | Fortune

"Adversary capabilities are advancing rapidly, and our acquisition strategies must move even faster to counter the growing speed and maneuverability of modern missile threats," Space Force Col. Bryon McClain said in a statement.
European startups
#us-military
World politics
fromFortune
1 day ago

The U.S. military may have already used up half of its most expensive missiles, and it could take up to 4 years to rebuild its stockpiles | Fortune

The U.S. faces a near-term risk of depleting its missile stockpiles, impacting future military readiness for potential conflicts.
World news
fromwww.mediaite.com
23 hours ago

NBC News Drops Bombshell Report on Trump War Battle Damage: Far Worse' Than Trump Team Said

Damage to U.S. military bases from Iranian strikes is more extensive and costly than previously disclosed by officials.
World politics
fromFortune
1 day ago

The U.S. military may have already used up half of its most expensive missiles, and it could take up to 4 years to rebuild its stockpiles | Fortune

The U.S. faces a near-term risk of depleting its missile stockpiles, impacting future military readiness for potential conflicts.
World news
fromwww.mediaite.com
23 hours ago

NBC News Drops Bombshell Report on Trump War Battle Damage: Far Worse' Than Trump Team Said

Damage to U.S. military bases from Iranian strikes is more extensive and costly than previously disclosed by officials.
from24/7 Wall St.
1 day ago

1 ETF to Buy Before a $1.5 Trillion Defense Budget Hits

The U.S. and its allies have expended a great deal of their arsenal in the past few years. It simply does not matter if there's a peace deal tomorrow, because those weapons must be stockpiled again and then some.
Business
US politics
fromWIRED
1 day ago

The Latest Push to Extend Key US Spy Powers Is Still a Mess

The bill lacks meaningful constitutional safeguards and allows broad discretion to the attorney general regarding access to the 702 program.
#ai-security
fromAxios
2 days ago
Privacy professionals

U.S. accuses China of "industrial-scale" campaigns to steal AI secrets

Intellectual property law
fromTechRepublic
2 days ago

White House Says China-Linked Actors Tried to 'Steal American AI'

Foreign entities, particularly from China, are allegedly extracting American AI models through unauthorized methods, raising national security concerns.
Privacy professionals
fromAxios
2 days ago

U.S. accuses China of "industrial-scale" campaigns to steal AI secrets

China-based actors are using proxy accounts to exploit U.S. AI models and extract proprietary information.
Toronto startup
fromTESLARATI
2 days ago

SpaceX just got pulled into the biggest Weapons Program in U.S. history

SpaceX is developing core software for the Golden Dome missile defense system, focusing on satellite communications integration with other defense companies.
Media industry
fromAxios
2 days ago

Firing fears ripple through "Mean Girls" Pentagon

At least 15 defense officials have left their positions under Trump 2.0 due to political and personal conflicts.
fromNextgov.com
2 days ago

Autonomous weapons will be 'key and essential part' of warfare, Joint Chiefs chair says

Gen. Dan Caine stated that autonomous weapons are going to be a 'key and essential part of everything we do' in future warfare, indicating a significant shift in military strategy.
Artificial intelligence
UK politics
fromwww.bbc.com
2 days ago

Proxy attacks in UK a real and growing concern, says PM

The UK government is increasingly concerned about hostile states using proxies for attacks, particularly against the Jewish community.
Venture
from24/7 Wall St.
3 days ago

These Are the 3 Biggest Winners From the Proposed $1.5 Trillion Defense Budget

The U.S. defense budget shift emphasizes software and data-driven solutions, benefiting companies like Palantir Technologies and others in autonomous systems.
#pentagon
Information security
fromSecurityWeek
2 days ago

Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents

Agentic AI is transforming cybersecurity, presenting both opportunities for defenders and risks for attackers, necessitating a strategic response from the industry.
#us-defense-spending
European startups
fromFortune
1 day ago

Trump's bellicose presidency is a 'golden opportunity' for defense firms, and business is booming | Fortune

U.S. defense companies are thriving due to increased military spending and demand for weapons amid ongoing conflicts.
Washington DC
fromBusiness Insider
5 days ago

The problem with America's $1 trillion military budget

US defense spending is projected to exceed $1 trillion, driven by a proposed $1.5 trillion budget for 2027 and high costs of military weapons.
European startups
fromFortune
1 day ago

Trump's bellicose presidency is a 'golden opportunity' for defense firms, and business is booming | Fortune

U.S. defense companies are thriving due to increased military spending and demand for weapons amid ongoing conflicts.
Washington DC
fromBusiness Insider
5 days ago

The problem with America's $1 trillion military budget

US defense spending is projected to exceed $1 trillion, driven by a proposed $1.5 trillion budget for 2027 and high costs of military weapons.
Privacy professionals
fromNextgov.com
1 day ago

Tech bills of the week: Creating data privacy standards; Securing critical infrastructure from drones; and more

Republican lawmakers introduced two data privacy bills focusing on consumer control and national standards for data management.
fromwww.aljazeera.com
2 days ago

Japan builds up its southern shield' as faith in US security cover falters

Japan's southern island of Kyushu is ground zero for one of the greatest shifts in Japan's defence strategy since 1947, when it formally renounced the use of war to settle international disputes.
World politics
Europe politics
fromwww.aljazeera.com
2 days ago

US considers suspending Spain from NATO, reported internal email suggests

The US Defense Department expresses frustration with Spain and the UK over their support in the Iran conflict, considering potential NATO repercussions.
Intellectual property law
fromNextgov.com
1 day ago

House lawmakers introduce quantum initiative reauthorization

The National Quantum Initiative Reauthorization Act aims to advance quantum information sciences and technology applications through federal coordination and partnerships.
Media industry
fromwww.mediaite.com
1 day ago

Pentagon Fires Stars and Stripes Ombudsman Who Warned of Attempted Control' Over Military Paper

The Pentagon fired the ombudsman of Stars and Stripes, raising concerns about editorial independence and control over the military newspaper.
#cisa
SF politics
fromTechCrunch
2 days ago

Trump's pick to run US cyber agency CISA asks to drop out | TechCrunch

Sean Plankey withdrew his nomination to lead CISA, leaving the agency without a permanent leader amid ongoing cybersecurity challenges.
SF politics
fromTechCrunch
2 days ago

Trump's pick to run US cyber agency CISA asks to drop out | TechCrunch

Sean Plankey withdrew his nomination to lead CISA, leaving the agency without a permanent leader amid ongoing cybersecurity challenges.
Germany news
fromwww.dw.com
2 days ago

Germany unveils first ever military strategy for Bundeswehr

Germany's Bundeswehr has adopted a military strategy to address increasing international threats, particularly from Russia.
US politics
fromwww.npr.org
2 days ago

After 2 failed votes, Mike Johnson unveils new plan to extend key U.S. spy powers

Mike Johnson's proposal to renew Section 702 of FISA lacks a warrant requirement, aiming to reauthorize the program for three years with oversight adjustments.
World news
fromSlate Magazine
5 days ago

The Surprisingly Anticlimactic End to America's War Against al-Qaida

Sayf al-Adl, an al-Qaida operative, remains elusive despite U.S. military actions, raising questions about the group's leadership and operational strength.
fromwww.mediaite.com
2 weeks ago

Weird Obsession With Death': Current and Former Defense Officials Sound the Alarm on Hegseth

Retired Army Special Forces officer Mike Nelson criticized Hegseth's rhetoric, stating, 'That's a necessary end to achieve goals through military force - you have to kill people to achieve them. That's not the end. It's a weird obsession with death for the sake of it.'
Right-wing politics
Europe politics
fromwww.theguardian.com
2 days ago

EU leaders agree blueprint for mutual assistance pact amid Trump's criticism of very disappointing Nato'

EU officials will create a plan for using the mutual assistance pact in response to foreign attacks amid rising NATO tensions.
European startups
fromFast Company
2 days ago

Trump administration vows crackdown on China's 'exploiting' of AI models made in the U.S.

The Trump administration aims to combat foreign exploitation of U.S. AI models, particularly targeting China amid rising competition in the AI sector.
World politics
fromwww.aljazeera.com
3 days ago

Infiltration from Within: Israelis recruited to spy for enemy countries

Israel's intelligence is exposed as flawed, revealing vulnerabilities from internal betrayals and arrogance leading to security failures.
US politics
fromTruthout
3 days ago

Pentagon Assessment Clashes With Trump's Claims on Iran as Public Opposes Continuing War

Seven in 10 Americans want the war in Iran to end quickly, contradicting President Trump's claims about Iran's military capabilities.
Washington DC
fromwww.npr.org
3 days ago

Pentagon says Navy secretary is leaving, the latest departure of a top defense leader

Navy Secretary John Phelan unexpectedly left his position amid ongoing military leadership shakeups during President Trump's second term.
#artificial-intelligence
Artificial intelligence
fromNextgov.com
4 days ago

US needs to flesh out strategy to counter China's robotics advances, lawmakers say

The U.S. needs a better strategy to counter China's growing dominance in robotics despite leading in AI development.
Information security
fromFortune
3 days ago

Former national cyber director: Anthropic's 'Mythos' AI can hack nearly anything and we aren't ready | Fortune

Mythos, Anthropic's advanced AI model, poses significant risks to critical infrastructure, necessitating urgent investment and collaboration to enhance cybersecurity.
Artificial intelligence
fromNextgov.com
4 days ago

US needs to flesh out strategy to counter China's robotics advances, lawmakers say

The U.S. needs a better strategy to counter China's growing dominance in robotics despite leading in AI development.
Information security
fromFortune
3 days ago

Former national cyber director: Anthropic's 'Mythos' AI can hack nearly anything and we aren't ready | Fortune

Mythos, Anthropic's advanced AI model, poses significant risks to critical infrastructure, necessitating urgent investment and collaboration to enhance cybersecurity.
UK politics
fromwww.independent.co.uk
4 days ago

Iran, Russia and China behind most major cyberattacks on UK, security chief warns

The Independent provides critical journalism on key issues without paywalls, emphasizing the importance of accessible reporting.
#anthropic
fromAxios
6 days ago
Intellectual property law

Scoop: NSA using Anthropic's Mythos despite Defense Department blacklist

Artificial intelligence
fromTNW | Us
4 days ago

Trump says Anthropic Pentagon deal is 'possible'

Anthropic's AI models may be used by the Department of Defense following positive discussions with the White House, despite previous federal restrictions.
fromAxios
6 days ago
Intellectual property law

Scoop: NSA using Anthropic's Mythos despite Defense Department blacklist

Artificial intelligence
fromTNW | Us
4 days ago

Trump says Anthropic Pentagon deal is 'possible'

Anthropic's AI models may be used by the Department of Defense following positive discussions with the White House, despite previous federal restrictions.
US politics
fromAxios
5 days ago

Trump invokes Cold War law in move to boost energy supply

Presidential memos signed by Trump enable the Energy Department to utilize funding for enhancing U.S. energy production and infrastructure.
Russo-Ukrainian War
fromNextgov.com
5 days ago

AI capabilities are needed to counter drone threats, senator says

The U.S. must adopt new AI capabilities to counter the growing threat of unmanned drones used by foreign adversaries.
Information security
fromSecurityWeek
2 days ago

US Federal Agency's Cisco Firewall Infected With 'Firestarter' Backdoor

A US federal agency was infected with malware due to vulnerabilities in Cisco firewalls linked to a China-backed espionage campaign.
Artificial intelligence
fromTechCrunch
5 days ago

NSA spies are reportedly using Anthropic's Mythos, despite Pentagon feud | TechCrunch

The NSA is reportedly using Anthropic's Mythos model for cybersecurity despite previous tensions over access to AI capabilities.
Information security
fromTheregister
1 day ago

CISA, NCSC issue Firestarter backdoor warning

Firestarter malware targets a US federal agency, maintaining persistent access to compromised devices, posing risks to government and critical infrastructure.
Information security
fromNextgov.com
3 days ago

Cyber Command carried out over 8,000 missions in 2025, director says

U.S. Cyber Command conducted over 8,000 missions in 2025, marking a 25% increase from 2024, with expectations for further growth in 2026.
Information security
fromSecurityWeek
2 days ago

Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World's Biggest Exercise

Locked Shields 2026 tested cyber defense capabilities of 4,000 participants from 41 nations against simulated cyberattacks on critical infrastructure.
Artificial intelligence
fromFortune
1 week ago

A retired general's warning: America can't fight the AI arms race on tech it doesn't control | Fortune

The U.S. faces a critical AI arms race affecting military power and national security, highlighted by the Anthropic-Pentagon standoff over AI usage control.
fromSecurityWeek
2 days ago

Vulnerabilities Patched in CrowdStrike, Tenable Products

CrowdStrike published an advisory for CVE-2026-40050, a critical unauthenticated path traversal vulnerability affecting its LogScale product. The flaw can allow a remote attacker to read arbitrary files from the server filesystem.
Information security
fromSecuritymagazine
3 days ago

Operationally Ineffective: Putting CVEs in a Chokehold with Privilege Disruption

A Common Vulnerability Exposure (CVE) that cannot reach the privilege plane is operationally ineffective - even at a CVSS Score of 10. This should be a core philosophy that is embedded into the fabric of software engineering.
Information security
Information security
fromAxios
4 days ago

Exclusive: OpenAI briefs feds and Five Eyes on new cyber product

OpenAI demonstrated its GPT-5.4-Cyber model to federal cyber defense practitioners, emphasizing a dual-track access approach for government and commercial users.
fromTheregister
1 month ago

Only Trump decides when cyberwar turns into real war

The president should have a lot of leeway in which he determines whether or not the nation's going to respond kinetically. This flexibility is crucial in the evolving landscape of cyber warfare.
World politics
Information security
from24/7 Wall St.
3 days ago

5 Cybersecurity Stocks Most Likely to Benefit as AI Threats Drive Budget Increases in 2026

AI surpasses most humans in finding software flaws, prompting a defensive coalition to enhance cybersecurity.
Information security
fromComputerWeekly.com
4 days ago

Nation states responsible for 'nationally significant' cyber attacks against UK, says NCSC chief | Computer Weekly

The UK faces increased cyber security threats from hostile states and AI advancements, with an average of four significant attacks weekly.
Venture
fromThe Cipher Brief
1 month ago

What the Latest Policy and Tech Shifts Mean for National Security

Counter-Unmanned Aerial Systems require integrated, multi-layered defense architectures combining non-kinetic and kinetic responses rather than isolated legacy technologies, as modern autonomous drones render traditional electronic warfare ineffective.
fromThe Cipher Brief
2 months ago

The 2026 National Defense Strategy: No Surprises but Plenty of Mandate

OPINION - The 2026 National Defense Strategy (NDS) follows closely the 2025 National Security Strategy, as it should. It also falls in line with the Department of Defense's narrative and the actions they have taken regarding priorities. The NDS has four lines of effort: Defending the U.S. Homeland - Homeland defense is the top priority, with the Western Hemisphere elevated above other regions. This includes border security, open lines of transportation (Panama Canal and Greenland), counter-narcotics operations, and countering adversary influence.
World news
fromThe Atlantic
2 months ago

Whatever This Is, It Is Not Strategy

But logistical consistency, like coherence and gravitas, does not characterize the new NDS. It is a document that supposedly nests within the National Security Strategy, explaining at greater length the implications of overall policy for the armed forces. The 2026 version does not do that. Rather, it restates some of the basic priorities of the Trump administration but for the most part confines itself to flattery of the president, insults, and bombast.
US politics
US politics
fromwww.aljazeera.com
2 months ago

What's behind the recent shift in US defence strategy?

U.S. defense strategy shifts to America First, prioritizing homeland security and Western Hemisphere influence while reducing commitments to allies worldwide.
US politics
fromThe Cipher Brief
2 months ago

Defending the Homeland: Pentagon Shifts Strategy on Drone Threats

DoD policy empowers commanders to use defensive measures, extend perimeters beyond installation fences, and counter UAS threats after an uncoordinated CBP laser incident.
Information security
fromSecuritymagazine
1 month ago

Security Leaders Discuss Trump's Cyber Strategy for America

The Trump Administration released a cyber strategy with six pillars addressing adversary capacity, regulation, federal and critical infrastructure security, emerging technology innovation, and workforce development.
[ Load more ]