The safe and secure use of nuclear and other radioactive material, along with the operation of nuclear facilities and management of associated facilities and activities, rely heavily on information ...
Abstract: In the face of security vulnerabilities in health and safety applications, governments and industry leaders have focused on security weaknesses in the design and protection of electronic ...
AI agents now make decisions and access systems on their own, creating identity blind spots traditional tools can't see.
Around 200,000 Linux computer systems from American computer maker Framework were shipped with signed UEFI shell components that could be exploited to bypass Secure Boot protections. According to ...
Interested contributors now have until 15 October 2025 to submit abstracts for the IAEA’s International Conference on Computer Security in the Nuclear World: Securing the Future, or CyberCon26.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results