<?xml version="1.0"?>
<News hasArchived="true" page="2" pageCount="19" pageSize="10" timestamp="Tue, 28 Apr 2026 06:16:35 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?mode=activity&amp;page=2">
<NewsItem contentIssues="false" id="155886" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/155886">
<Title>CyberDawgs at UMBC Involvement Fest</Title>
<Tagline>Learn about the Cyberdawgs club &amp; how to join, 12-2 2/4</Tagline>
<Body>
<![CDATA[
    <div class="html-content">UMBC's <strong><a href="https://umbccd.umbc.edu/" rel="nofollow external" class="bo">CyberDawgs</a></strong><span>club will be at the <a href="https://welcomeretrievers.umbc.edu/involvement-fest/" rel="nofollow external" class="bo">Spring Involvement Fest</a> from 12-2 on Wednesday, February 4 in the UMBC RAC to show what the club does and how you can get involved. If you're interested in Cybersecurity, Capture the Flag competitions, or competitive cybersecurity through competitions, then CyberDawgs is for you. Stop by to learn more, get access to the club Discord, and find out what events are coming up next.</span></div>
]]>
</Body>
<Summary>UMBC's CyberDawgsclub will be at the Spring Involvement Fest from 12-2 on Wednesday, February 4 in the UMBC RAC to show what the club does and how you can get involved. If you're interested in...</Summary>
<Website>https://umbccd.umbc.edu/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/155886/guest@my.umbc.edu/0609222a132917197a961b87e619901a/api/pixel</TrackingUrl>
<Tag>club</Tag>
<Tag>cyber</Tag>
<Tag>cyberdawgs</Tag>
<Tag>cybersecurity</Tag>
<Tag>security</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/886/4be2eef6fecee38d7eeae02e0ee341d5/xxlarge.jpg?1769444396</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/886/4be2eef6fecee38d7eeae02e0ee341d5/xlarge.jpg?1769444396</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/886/4be2eef6fecee38d7eeae02e0ee341d5/large.jpg?1769444396</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/886/4be2eef6fecee38d7eeae02e0ee341d5/medium.jpg?1769444396</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/886/4be2eef6fecee38d7eeae02e0ee341d5/small.jpg?1769444396</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/886/4be2eef6fecee38d7eeae02e0ee341d5/xsmall.jpg?1769444396</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/886/4be2eef6fecee38d7eeae02e0ee341d5/xxsmall.jpg?1769444396</ThumbnailUrl>
<ThumbnailAltText>umbc cyberdawgs club</ThumbnailAltText>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 26 Jan 2026 11:32:58 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="155610" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/155610">
<Title>UMBC open cybersecurity faculty position</Title>
<Body>
<![CDATA[
    <div class="html-content">UMBC's <a href="https://coeit.umbc.edu/" rel="nofollow external" class="bo"><strong>College of Engineering and Information Technology</strong></a> plans to make one hire at the assistant or associate professor levels to bolster its strengths in cybersecurity research. Applicants can get more information and apply <a href="https://apply.interfolio.com/178333" rel="nofollow external" class="bo"><strong>here</strong></a>. Areas of interest include:<div><ul><li>Problems at the intersection of cybersecurity and artificial intelligence/machine learning</li><li>Systems and software cybersecurity: secure hardware, OS, network, and cloud/edge systems</li><li>Usable security/privacy with emphasis on privacy, trust, and user resilience</li></ul></div><div><p>Applicants with research and teaching interests in other fields related to cybersecurity are encouraged to apply. UMBC seeks applicants who are committed to conducting interdisciplinary research within the College, teaching and mentoring a diverse student body, and embracing equity and inclusion principles in their research, teaching, and service contributions.</p></div></div>
]]>
</Body>
<Summary>UMBC's College of Engineering and Information Technology plans to make one hire at the assistant or associate professor levels to bolster its strengths in cybersecurity research. Applicants can...</Summary>
<Website>https://apply.interfolio.com/178333</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/155610/guest@my.umbc.edu/55422eff302c32b5ccd049b0da180dc4/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>faculty</Tag>
<Tag>position</Tag>
<Tag>umbc</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 09 Jan 2026 10:36:06 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="155542" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/155542">
<Title>NCCoE Cybersecurity Connections Event</Title>
<Tagline>11-1:30pm Tue. January 13, in person and online</Tagline>
<Body>
<![CDATA[
    <div class="html-content">The NIST National Cybersecurity Center of Excellence (NCCoE) will host a quarterly Cybersecurity Connections event and networking lunch in-person and online in partnership with the Maryland Department of Commerce and Montgomery County, MD. <span>Event Location: online and at 9700 Great Seneca Hwy, Rockville, MD 20850 and online</span><div><br><p>This event will feature a keynote presentation from Jessica Gulick, CEO and Founder of Katzcy and Commissioner of the U.S. Cyber Team. Jessica will discuss how the U.S. Cyber Games is advancing cybersecurity awareness, skills development, and cyber career preparation on a global scale. The keynote will also spotlight opportunities for Maryland-based individuals and organizations to engage with and support the initiatives of the U.S. Cyber Team.</p><p>In addition, our expert panel on building a robust cybersecurity workforce will discuss topics such as the critical skills and competencies needed to succeed in today's cybersecurity landscape, the accessibility of cybersecurity education, and what workforce challenges critical infrastructure owners and operators may face in the future. This panel will be followed by a networking lunch, generously provided by the Montgomery County Economic Development Corporation on behalf of Montgomery County.</p><p><a href="https://links-1.govdelivery.com/CL0/https:%2F%2Fwww.nccoe.nist.gov%2Fget-involved%2Fattend-events%2Fcybersecurity-connections-strengthening-cybersecurity-workforce%23agenda/1/0100019b9442d8c8-a127003a-0f43-474f-aa4f-9472052e47b7-000000/wrTO6THo-CSzcrCgXjnKuE9S_trZYyuVnkQrrDvc3nI=439" rel="nofollow external" class="bo">View the agenda</a>.</p><p>Registration closes tomorrow, January 7.  </p><h4><a href="https://links-1.govdelivery.com/CL0/https:%2F%2Fwww.nccoe.nist.gov%2Fget-involved%2Fattend-events%2Fcybersecurity-connections-strengthening-cybersecurity-workforce/2/0100019b9442d8c8-a127003a-0f43-474f-aa4f-9472052e47b7-000000/eyKTzzAVtch0c7PcuXOjqqVYCosi0lKbzCpe4A81l70=439" rel="nofollow external" class="bo">Register Now!</a></h4></div></div>
]]>
</Body>
<Summary>The NIST National Cybersecurity Center of Excellence (NCCoE) will host a quarterly Cybersecurity Connections event and networking lunch in-person and online in partnership with the Maryland...</Summary>
<Website>https://links-1.govdelivery.com/CL0/https:%2F%2Fwww.nccoe.nist.gov%2Fget-involved%2Fattend-events%2Fcybersecurity-connections-strengthening-cybersecurity-workforce%23agenda/1/0100019b9442d8c8-a127003a-0f43-474f-aa4f-9472052e47b7-000000/wrTO6THo-CSzcrCgXjnKuE9S_trZYyuVnkQrrDvc3nI=439</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/155542/guest@my.umbc.edu/5821db658225571072665b34523a2d9d/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>workshop</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/542/ca0f462995a49910f68d82fe582d440e/xxlarge.jpg?1767720155</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/542/ca0f462995a49910f68d82fe582d440e/xlarge.jpg?1767720155</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/542/ca0f462995a49910f68d82fe582d440e/large.jpg?1767720155</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/542/ca0f462995a49910f68d82fe582d440e/medium.jpg?1767720155</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/542/ca0f462995a49910f68d82fe582d440e/small.jpg?1767720155</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/542/ca0f462995a49910f68d82fe582d440e/xsmall.jpg?1767720155</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/542/ca0f462995a49910f68d82fe582d440e/xxsmall.jpg?1767720155</ThumbnailUrl>
<ThumbnailAltText>NIST cybersecurity workshop</ThumbnailAltText>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 06 Jan 2026 12:28:30 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="155500" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/155500">
<Title>AFCEA Signal Media's On Point: Q&amp;A With Richard Forno</Title>
<Tagline>On offense vs. defense, AI, an how UMBC meets the challenges</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div>The <a href="https://www.afcea.org/" rel="nofollow external" class="bo"><strong>AFCEA</strong></a> Signal Media site shared a short <strong><a href="https://www.afcea.org/signal-media/test-signal-landing-page-format/point-qa-richard-forno" rel="nofollow external" class="bo">interview</a></strong> with UMBC's <a href="https://rickf.org/" rel="nofollow external" class="bo"><strong>Richard Forno</strong></a>. In it, he gives his thoughts on US government's more offensive stance in cyber space, on whether AI will benefit cyber defenders more than attackers, and how UMBC is working to meet current challenges in cybersecurity research and education.</div><div><br></div><div><br></div></div>
]]>
</Body>
<Summary>The AFCEA Signal Media site shared a short interview with UMBC's Richard Forno. In it, he gives his thoughts on US government's more offensive stance in cyber space, on whether AI will benefit...</Summary>
<Website>https://www.afcea.org/signal-media/test-signal-landing-page-format/point-qa-richard-forn</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/155500/guest@my.umbc.edu/54805863a02817183abbf7498a02c4f1/api/pixel</TrackingUrl>
<Tag>afcea</Tag>
<Tag>ai</Tag>
<Tag>cybersecurity</Tag>
<Tag>forno</Tag>
<Tag>signal-media</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/500/dac5cb45022f94b349feb5f0f952fa26/xxlarge.jpg?1767550072</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/500/dac5cb45022f94b349feb5f0f952fa26/xlarge.jpg?1767550072</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/500/dac5cb45022f94b349feb5f0f952fa26/large.jpg?1767550072</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/500/dac5cb45022f94b349feb5f0f952fa26/medium.jpg?1767550072</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/500/dac5cb45022f94b349feb5f0f952fa26/small.jpg?1767550072</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/500/dac5cb45022f94b349feb5f0f952fa26/xsmall.jpg?1767550072</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/500/dac5cb45022f94b349feb5f0f952fa26/xxsmall.jpg?1767550072</ThumbnailUrl>
<ThumbnailAltText>Image of a group of people using computers</ThumbnailAltText>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 04 Jan 2026 13:42:01 -0500</PostedAt>
<EditAt>Sun, 04 Jan 2026 13:51:55 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="155242" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/155242">
<Title>Talk: Analysis of the Security Design, Engineering, and Implementation of the SecureDNA System</Title>
<Tagline>12-1 pm EST Friday, December 12, 2025 online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p>The UMBC Cyber Defense Lab presents</p><h4><strong>Analysis of the Security Design, Engineering, and Implementation of the SecureDNA System</strong></h4><p><strong>Alan T. Sherman, Enis Golszewski, and Jeremy J. Romanik Romano<br>UMBC CSEE Department</strong></p><p><strong>Joint work with Edward Zieglar, Jonathan D. Fuchs, and William E. Byrd</strong></p><p><strong>12:00 noon–1pm Friday, December 12, 2025 via </strong><a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo"><strong>WebEx</strong></a></p><p>We analyze security aspects of the SecureDNA system regarding its system design, engineering, and implementation. This system enables DNA synthesizers to screen order requests against a database of hazards.  By applying novel cryptography involving distributed oblivious pseudorandom functions, the system aims to keep order requests and the database of hazards secret. Discerning the detailed operation of the system in part from source code (Version 1.0.8), our analysis examines key management, certificate infrastructure, authentication, and rate-limiting mechanisms. We also perform the first formal-methods analysis of the mutual authentication, basic request, and exemption-handling protocols.</p><p>Without breaking the cryptography, our main finding is that SecureDNA's custom mutual authentication protocol SCEP achieves only one-way authentication: the hazards database and keyservers never learn with whom they communicate. This structural weakness violates the principle of defense in depth and enables an adversary to circumvent rate limits that protect the secrecy of the hazards database, if the synthesizer connects with a malicious or corrupted keyserver or hashed database. We point out an additional structural weakness that also violates the principle of defense in depth: inadequate cryptographic bindings prevent the system from detecting if responses, within a TLS channel, from the hazards database were modified. Consequently, if a synthesizer were to reconnect with the database over the same TLS session, an adversary could replay and swap responses from the database without breaking TLS. Although the SecureDNA implementation does not allow such reconnections, it would be stronger security engineering to avoid the underlying structural weakness. We identify these vulnerabilities and suggest and verify mitigations, including adding strong bindings. Software Version 1.1.0 fixes SCEP with our proposed SCEP+ protocol.</p><p>Our work illustrates that a secure system needs more than sound mathematical cryptography; it also requires formal specifications, sound key management, proper binding of protocol message components, and careful attention to engineering and implementation details.</p><p><a href="https://www.csee.umbc.edu/people/faculty/alan-t-sherman/" rel="nofollow external" class="bo"><strong>Dr. Alan T. Sherman</strong></a> is a professor of computer science at UMBC in the CSEE Department, associate director of UMBC's Cybersecurity Institute, and director of the Cyber Defense Lab.  His main research interest is high-integrity voting systems. He has carried out research in election systems, protocol analysis, algorithm design, cryptanalysis, theoretical foundations for cryptography, applications of cryptography, cloud forensics, and cybersecurity education. Dr. Sherman is also a private consultant performing security analyses and serving as an expert witness.  Sherman earned the PhD degree in computer science at MIT in 1987, studying under Ronald L. Rivest.  His research accomplishments include contributions to the Scantegrity and VoteXX election systems and development and validation of the Cybersecurity Concept Inventory (CCI) and Cybersecurity Curriculum Assessment (CCA). This work has been presented at USENIX Security 2010 and E-VOTE-ID 2025, and won best research paper at SIGSCE 2023. Sherman received approximately $15 million in funding from NSF, NSA, and IBM. </p><p><strong><a href="https://www.csee.umbc.edu/enis-golaszewski/" rel="nofollow external" class="bo"><strong>Dr. Enis Golaszewski</strong></a> </strong>is a teaching assistant professor of computer science at UMBC in the CSEE Department.  He holds weekly workshops in formal-methods analyses of cryptographic protocols using the Cryptographic Protocol Shapes Analyzer (CPSA). His current research projects include analysis of the Coalition for Content Provenance and Authenticity (C2PA) protocol. Golaszewski earned the PhD under Sherman. His dissertation includes the design and development of a tool---ProtoBindGuard---that automatically binds protocol messages to context to prevent protocol-interaction attacks.  Golaszewski is a former SFS scholar at UMBC. <a href="https://www.csee.umbc.edu/enis-golaszewski/" rel="nofollow external" class="bo">https://www.csee.umbc.edu/enis-golaszewski/</a></p><p><strong>Jeremy J. Romanik Romano</strong> is an MS student in computer science at UMBC.  His research interests include cybersecurity, software security, and protocol analysis.  His involvement in this project began through being a student in Sherman's INSuRE and cryptology research courses.  Romano is a member of the UMBC Protocol Analysis Lab and system administration and cybersecurity clubs on campus.</p>Support for this event was provided in part by NSF under grants DGE-1753681 and 2438185. </div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Analysis of the Security Design, Engineering, and Implementation of the SecureDNA System  Alan T. Sherman, Enis Golszewski, and Jeremy J. Romanik Romano UMBC...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/155242/guest@my.umbc.edu/9a0071f6f931c4880b76f3802acbca7e/api/pixel</TrackingUrl>
<Tag>cryptography</Tag>
<Tag>securedna</Tag>
<Tag>security</Tag>
<Tag>talk</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/242/02f32b4cba306f3f9ad23578e138a682/xxlarge.jpg?1765471295</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/242/02f32b4cba306f3f9ad23578e138a682/xlarge.jpg?1765471295</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/242/02f32b4cba306f3f9ad23578e138a682/large.jpg?1765471295</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/242/02f32b4cba306f3f9ad23578e138a682/medium.jpg?1765471295</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/242/02f32b4cba306f3f9ad23578e138a682/small.jpg?1765471295</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/242/02f32b4cba306f3f9ad23578e138a682/xsmall.jpg?1765471295</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/242/02f32b4cba306f3f9ad23578e138a682/xxsmall.jpg?1765471295</ThumbnailUrl>
<ThumbnailAltText>talk announcement</ThumbnailAltText>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 11 Dec 2025 11:45:53 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="153830" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/153830">
<Title>Talk 10/31: Usable String Matching by Humans through Overlaid Presentation: Turning Syntactic Tasks into Perceptual Tasks</Title>
<Tagline>12:00&#8211;1pm, Friday, October 31, 2025 online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p>UMBC Cyber Defense Lab presents</p><p><strong>Usable String Matching by Humans through Overlaid Presentation: </strong><strong>Turning Syntactic Tasks into Perceptual Tasks</strong></p><p><strong>12:00–1pm, Friday, October 31, 2025 via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo"><strong>WebEx</strong></a></strong></p><p><strong>Alan T. Sherman, CSEE Department, UMBC</strong></p><p>Joint work with Enka Blanchard, Ted Selker, Ryan Robucci, Levi Gabasova, and Mehdi Bouhamidi</p><p>Comparing two strings of characters is a basic activity that occurs in innocuous contexts (checking that an email address was entered correctly) and critical ones (from bank wire transfers to nuclear codes), where it is not always possible to trust a machine to perform the task. Because human performance on this task has received limited attention, we explore the limits and capabilities of humans to compare strings when presented in various formats. I am especially motivated by the important application of checking audit data in end-to-end voting systems including <a href="https://en.wikipedia.org/wiki/Scantegrity" rel="nofollow external" class="bo"><strong>Scantegrity</strong></a>.</p><p>We present results from two online experiments with a total of 178 human subjects who compared pairs of text strings to determine for each pair whether the two strings are identical. Each subject was asked to complete 20 trials, which presented strings of 5, 10, or 15 characters or short nonsense sentences. For each pair, the strings were either identical or differed by one character (randomly changed or changed to be difficult to detect).</p><p>Our main insight was to check the difference between strings shown <em>side by side</em>, or <em>overlaid</em> in two colors.  Our hypothesis is that, by turning <em>complex syntactic tasks</em> into <em>simple perceptual tasks</em>, such overlay formats can offer advantages in speed and accuracy in comparison with simple side-by-side presentations. Results show that, in comparison with side-by-side comparison, overlay offers a substantially faster method, with substantially improved accuracy for long strings, which has many applications including comparing fingerprints of cryptographic keys and establishing authenticity of authorization tickets.</p><p>Our work lays a foundation on which other new perceptual string-comparison strategies can be explored, such as using reflection to compare a string presented on a smartphone with one on a computer display monitor.</p><p><em>Dr. <a href="https://www.csee.umbc.edu/people/faculty/alan-t-sherman/" rel="nofollow external" class="bo">Alan T. Sherman</a></em> is a professor of computer science at UMBC in the CSEE Department, associate director of UMBC's <a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo">Cybersecurity Institute</a>, and director of the <a href="https://cisa.umbc.edu/" rel="nofollow external" class="bo">Cyber Defense Lab</a>.  His main research interest is high-integrity voting systems. He has carried out research in election systems, protocol analysis, algorithm design, cryptanalysis, theoretical foundations for cryptography, applications of cryptography, cloud forensics, and cybersecurity education. Dr. Sherman is also a private consultant performing security analyses and serving as an expert witness. Sherman earned the PhD degree in computer science at MIT in 1987 studying under Ronald L. Rivest.  His research accomplishments include contributions to the <em><a href="https://en.wikipedia.org/wiki/Scantegrity" rel="nofollow external" class="bo">Scantegrity</a></em> and <em><a href="https://votexx.org/" rel="nofollow external" class="bo">VoteXX</a></em> election systems and development and validation of the <em>Cybersecurity Concept Inventory (CCI)</em> and <em>Cybersecurity Curriculum Assessment (CCA)</em>. This work has been presented at USENIX Security 2010 and E-VOTE-ID 2025, and won best research paper at SIGSCE 2023. Sherman received approximately $15 million in funding from NSF, NSA, and IBM.</p><p><em>Support for this event was provided in part by the NSF under SFS grants </em><em>DGE-1753681 and 2438185. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1pm.  All meetings are open to the public.</em></p><div><em><br></em></div></div>
]]>
</Body>
<Summary>UMBC Cyber Defense Lab presents  Usable String Matching by Humans through Overlaid Presentation: Turning Syntactic Tasks into Perceptual Tasks  12:00–1pm, Friday, October 31, 2025 via WebEx  Alan...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/153830/guest@my.umbc.edu/2cebca3f5dfaeb2447cd20687905a16b/api/pixel</TrackingUrl>
<Tag>comparison</Tag>
<Tag>scantegrity</Tag>
<Tag>security</Tag>
<Tag>string</Tag>
<Tag>votin</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/830/67a37afe0be957eeaa055a7d555454b6/xxlarge.jpg?1761171020</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/830/67a37afe0be957eeaa055a7d555454b6/xlarge.jpg?1761171020</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/830/67a37afe0be957eeaa055a7d555454b6/large.jpg?1761171020</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/830/67a37afe0be957eeaa055a7d555454b6/medium.jpg?1761171020</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/830/67a37afe0be957eeaa055a7d555454b6/small.jpg?1761171020</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/830/67a37afe0be957eeaa055a7d555454b6/xsmall.jpg?1761171020</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/830/67a37afe0be957eeaa055a7d555454b6/xxsmall.jpg?1761171020</ThumbnailUrl>
<ThumbnailAltText>Scantegrity ballot</ThumbnailAltText>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 22 Oct 2025 18:48:54 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="153535" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/153535">
<Title>Talk: Applications of Quantum Computing and Optimization in Cybersecurity</Title>
<Tagline>12&#8211;1pm EDT, Friday, October 17, 2025, online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h4><strong>Applications of Quantum Computing and Optimization in Cybersecurity</strong></h4><h4>Mohammadhossein Mohammadisiahroudi</h4><h4>Math/Stat Department, UMBC</h4><div><br></div><div><strong>Joint work with Zeguan Wu, Brandon Augustino, Tamás Terlaky, and Giacomo Nannicini</strong></div><div><br></div><div><strong>12:00 noon–1pm, Friday, October 17, 2025, <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo"><strong>WebEx</strong></a></strong></div><div><br></div><div>Quantum computing has emerged as a transformative computational paradigm capable of solving certain classically intractable problems exponentially faster. Among its groundbreaking developments, Shor’s algorithm demonstrated an exponential speedup for integer factorization, posing a potential threat to existing cryptographic systems and highlighting the disruptive impact of quantum computing on cybersecurity. Quantum computing, however, also presents opportunities to strengthen cybersecurity by enhancing optimization and information-processing capabilities. In this talk, we explore the intersection of quantum computing and optimization, focusing on quantum algorithms that offer computational advantages in solving large-scale optimization problems. In particular, we discuss the Quantum Interior Point Method, which provides a complexity advantage for solving conic optimization problems. We further illustrate potential applications in cybersecurity and information science, such as optimization models involving entropy and relative entropy cones, demonstrating how quantum optimization techniques can contribute to secure and efficient cyber-infrastructures.</div><div><br></div><div><a href="https://www.linkedin.com/in/mohammad-mohammadisiahroudi-168bbb8b/" rel="nofollow external" class="bo"><strong>Mohammad</strong></a>  is an assistant professor in the Department of Mathematics and Statistics at UMBC. He is also member of UMBC's <a href="https://qsi.umbc.edu/" rel="nofollow external" class="bo">Quantum Science Institute</a> and <a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo">Cybersecurity Institute</a>. Before joining UMBC, from 2024 to 2025, he was a postdoctoral research associate in the Quantum Computing and Optimization Lab at Lehigh University. He received his PhD in industrial and systems engineering from Lehigh University in August 2024. His research focuses on developing, analyzing, and implementing efficient quantum and classical algorithms for solving large-scale optimization problems arising in various applications, including machine learning, healthcare, and cybersecurity. His work has been recognized with the 2025 Pritsker Doctoral Dissertation Award from Institute of Industrial and System Engineers, the 2023 INFORMS Computing Society Best Student Paper Prize, and the 2023 Van Hoesen Family Best Publication Award.</div><div><br></div><div>Host: Alan T. Sherman, <a href="mailto:sherman@umbc.edu">sherman@umbc.edu</a></div><div><br></div><div>Support for this event was provided in part by the NSF under SFS grants DGE-1753681 and 2438185. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1pm.  All meetings are open to the public.</div></div>
]]>
</Body>
<Summary>Applications of Quantum Computing and Optimization in Cybersecurity  Mohammadhossein Mohammadisiahroudi  Math/Stat Department, UMBC     Joint work with Zeguan Wu, Brandon Augustino, Tamás Terlaky,...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/153535/guest@my.umbc.edu/8eb7735f31e91fde0e941d0bb9b721b2/api/pixel</TrackingUrl>
<Tag>computing</Tag>
<Tag>cybersecurity</Tag>
<Tag>optimization</Tag>
<Tag>quantum</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/535/b21f2f2f01d28a92d584ffa368c4d17b/xxlarge.jpg?1760391338</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/535/b21f2f2f01d28a92d584ffa368c4d17b/xlarge.jpg?1760391338</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/535/b21f2f2f01d28a92d584ffa368c4d17b/large.jpg?1760391338</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/535/b21f2f2f01d28a92d584ffa368c4d17b/medium.jpg?1760391338</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/535/b21f2f2f01d28a92d584ffa368c4d17b/small.jpg?1760391338</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/535/b21f2f2f01d28a92d584ffa368c4d17b/xsmall.jpg?1760391338</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/535/b21f2f2f01d28a92d584ffa368c4d17b/xxsmall.jpg?1760391338</ThumbnailUrl>
<ThumbnailAltText>headshot of umbc professor 
Mohammadhossein Mohammadisiahroudi</ThumbnailAltText>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 13 Oct 2025 17:48:25 -0400</PostedAt>
<EditAt>Mon, 13 Oct 2025 17:55:37 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="153458" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/153458">
<Title>Federal shutdown deals blow to already hobbled cybersecurity agency CISA</Title>
<Body>
<![CDATA[
    <div class="html-content">UMBC's Dr. <a href="https://rickf.org/" rel="nofollow external" class="bo">Richard Forno</a> published an article in The Conversation on the impacts of the US federal government shutdown on cybersecurity, especially on the <a href="https://www.cisa.gov/" rel="nofollow external" class="bo">Cybersecurity and Infrastructure Security Agency</a> (CISA), the nation’s leading civilian cybersecurity agency. Nearly 1,000 CISA employees had left the agency through voluntary buyouts or deferred resignations earlier in 2025.  Now, only about one-third of CISA's remaining employees are working after federal employees were furloughed due to the federal government shutdown.<div><br></div><div>In addition, the president's draft 2026 budget proposes to reduce CISA's head count by nearly one-third, and Congress failed to renew the <a href="https://www.congress.gov/crs-product/IF12959" rel="nofollow external" class="bo">Cybersecurity Information Sharing Act</a>, the law providing a <a href="https://www.lawfaremedia.org/article/the-case-for-reauthorizing-cisa-2015" rel="nofollow external" class="bo">legal shield</a> that allowed companies and infrastructure operators to share timely and often sensitive information with CISA about the cyberattacks, vulnerabilities, and incidents that they were encountering.<br><div><br></div><div>You can read Dr. Forno's article <a href="https://umbc.edu/stories/federal-shutdown-deals-blow-to-already-hobbled-cybersecurity-agency/" rel="nofollow external" class="bo">here</a>.</div></div></div>
]]>
</Body>
<Summary>UMBC's Dr. Richard Forno published an article in The Conversation on the impacts of the US federal government shutdown on cybersecurity, especially on the Cybersecurity and Infrastructure Security...</Summary>
<Website>https://umbc.edu/stories/federal-shutdown-deals-blow-to-already-hobbled-cybersecurity-agency/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/153458/guest@my.umbc.edu/a9d79cad02cd3ff514ce7e4cdd53d6a7/api/pixel</TrackingUrl>
<Tag>cisa</Tag>
<Tag>cybersecurity</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/458/013775eb9c001b79a182869dfc599ff5/xxlarge.jpg?1760106418</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/458/013775eb9c001b79a182869dfc599ff5/xlarge.jpg?1760106418</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/458/013775eb9c001b79a182869dfc599ff5/large.jpg?1760106418</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/458/013775eb9c001b79a182869dfc599ff5/medium.jpg?1760106418</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/458/013775eb9c001b79a182869dfc599ff5/small.jpg?1760106418</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/458/013775eb9c001b79a182869dfc599ff5/xsmall.jpg?1760106418</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/458/013775eb9c001b79a182869dfc599ff5/xxsmall.jpg?1760106418</ThumbnailUrl>
<ThumbnailAltText>logo of CISA the Cybersecurity and Infrastructure Security Agency</ThumbnailAltText>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 10 Oct 2025 10:47:30 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="153294" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/153294">
<Title>Two talks on Security Challenges for Immersive Technologies</Title>
<Tagline>7-8:30am EDT, Thursday October 9, 2025</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p>The <a href="https://incs-coe.org/" rel="nofollow external" class="bo">International Cyber Security Center of Excellence</a> (INCS-CoE), of which UMBC is a charter member, will hold an online seminar on <a href="https://incs-coe.org/seminars/#e6c234cf46c4ce4d4" rel="nofollow external" class="bo">Security Challenges for Immersive Technologies</a> from 7:00 to 8:30 am EDT on Thursday, October 9 via <strong><a href="https://hal.zoom.us/j/7376032434?pwd=azlzMncyK0tDOGhIUVRTVWZ3Z2RQdz09&amp;omn=98549414704" rel="nofollow external" class="bo">Zoom</a>.</strong> The seminar will consist of two talks. </p><p><strong>Enhancing Security and Privacy in Augmented Reality - Through the Lens of Eye </strong><strong>Tracking, <a href="https://people.cs.vt.edu/boji" rel="nofollow external" class="bo"><strong>Bo Ji</strong></a>, Virginia Tech</strong></p><p><a href="https://en.wikipedia.org/wiki/Augmented_reality" rel="nofollow external" class="bo">Augmented Reality</a> (AR) devices distinguish themselves from other mobile devices by providing an immersive and interactive experience. The ability of these devices to collect information presents challenges and opportunities to improve existing security and privacy techniques in this domain. In this talk, I will discuss how readily available eye-tracking sensor data can be used to improve existing methods for assuring security and protecting the privacy of those near the device. Our research has presented three new systems, BystandAR, ShouldAR, and GazePair, leveraging the user's eye gaze to improve security and privacy expectations in or with AR. As these devices grow in power and number, such solutions are necessary to prevent perception and privacy failures that hindered earlier devices. This work is presented in the hope that these solutions can improve and expedite the adoption of these powerful and useful AR devices.</p><p><strong>Shaping the Metaverse: Policy engagement with immersive technologies in the UK, <a href="https://pure.qub.ac.uk/en/persons/jesus-martinez-del-rincon" rel="nofollow external" class="bo"><strong>Jesus Martinez del Rincon</strong></a>, Queen's University Belfast</strong></p><p>Queen's University Belfast completed a two-phase <a href="https://www.qub.ac.uk/research-centres/csit/research/MetaverseHorizon-ScanningProject/" rel="nofollow external" class="bo">Metaverse</a> technologies horizon scanning project in July 2023 and 2025. This talk will cover a summary of the most relevant findings and outcomes. In the first phase, we presented a broad landscaping report of UK interests and activities in related technical areas. Building on areas where the UK might benefit from the emerging Metaverse, the second phase, deepens the analysis in three main areas: a) interoperability standards: where we highlighted current metaverse standards development organisations and identified the strategic aims of such participation; b) privacy, security and regulations: investigating two complementary aspects: (1) the evolving regulatory and legal landscape related to data collection by metaverse service operators; (2) a thread analysis of the metaverse and a technical analysis of the privacy preserving technologies that could enable metaverse data platforms; c) a horizon-scanning of Distributed Ledger Technology (DLT) and their application to the Metaverse.</p><h4>Join the seminar via <a href="https://hal.zoom.us/j/7376032434?pwd=azlzMncyK0tDOGhIUVRTVWZ3Z2RQdz09&amp;omn=98549414704" rel="nofollow external" class="bo">Zoom</a>.</h4></div>
]]>
</Body>
<Summary>The International Cyber Security Center of Excellence (INCS-CoE), of which UMBC is a charter member, will hold an online seminar on Security Challenges for Immersive Technologies from 7:00 to 8:30...</Summary>
<Website>https://incs-coe.org/seminars/#e6c234cf46c4ce4d4</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/153294/guest@my.umbc.edu/08561a306cc8adbf01aa6f791d846a12/api/pixel</TrackingUrl>
<Tag>augmented-reality</Tag>
<Tag>cybersecurity</Tag>
<Tag>metaverse</Tag>
<Tag>security</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>International Cyber Security Center of Excellence</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/294/7c68bb93a51442612d075e21c68650ce/xxlarge.jpg?1759768103</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/294/7c68bb93a51442612d075e21c68650ce/xlarge.jpg?1759768103</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/294/7c68bb93a51442612d075e21c68650ce/large.jpg?1759768103</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/294/7c68bb93a51442612d075e21c68650ce/medium.jpg?1759768103</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/294/7c68bb93a51442612d075e21c68650ce/small.jpg?1759768103</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/294/7c68bb93a51442612d075e21c68650ce/xsmall.jpg?1759768103</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/294/7c68bb93a51442612d075e21c68650ce/xxsmall.jpg?1759768103</ThumbnailUrl>
<ThumbnailAltText>page on the incs-coe</ThumbnailAltText>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 06 Oct 2025 12:35:13 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="153145" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/153145">
<Title>Talk: Self-Defending Ledgers: Automating Distributed Ledger Security Using Multi-Agent Reinforcement Learning and Game Theory</Title>
<Tagline>12-1 EDT Friday, October 3, 2025, online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p>The UMBC Cyber Defense Lab presents</p><p><strong>Self-Defending Ledgers: Automating Distributed Ledger Security Using Multi-Agent Reinforcement Learning and Game Theory</strong></p><p><a href="https://paveltariq.com/" rel="nofollow external" class="bo"><strong>Md Tariqul Islam 'Pavel'</strong></a><br>Assistant Professor of Cybersecurity<br>UMBC Department of Information Systems</p><p>12–1pm EDT, Friday, October 3, 2025 via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo"><strong>Webex</strong></a></p><p><a href="https://en.wikipedia.org/wiki/Distributed_ledger" rel="nofollow external" class="bo">Distributed ledger technologies</a> (DLTs) continue to face significant security challenges. While attackers constantly adapt their strategies, governance mechanisms often remain static. Our work addresses this critical gap by introducing a framework for self-defending ledgers, where nodes enforce ledger security through adaptive governance driven by <a href="https://en.wikipedia.org/wiki/Multi-agent_reinforcement_learning" rel="nofollow external" class="bo">multi-agent reinforcement learning </a>(MARL) grounded in game-theoretic principles. We model DLT consensus as a repeated Bayesian game, in which participants hold probabilistic beliefs about peer behavior, allowing agents to make strategic decisions under partial observability of adversarial actions. Our framework enables nodes to model, detect, and respond to a wide range of malicious behaviors, including bribery, selfish mining, equivocation, Sybil attacks, and collusive voting, by continuously updating Bayesian trust beliefs and governance policies based on network observations. We formally prove that networks with an honest majority reach stable equilibria and provide bounds on adversarial influence. Experiments across five major protocols show that agents effectively identify attacks with high accuracy while substantially reducing adversarial success. This work demonstrates the potential of game-theoretic MARL to provide robust, self-adaptive security in varied DLT environments, paving the way for resilient and autonomous ledger governance.</p><p><a href="https://paveltariq.com/" rel="nofollow external" class="bo"><strong>Md Tariqul Islam 'Pavel'</strong></a> is an assistant professor of cybersecurity in UMBC's Department of Information Systems. His research centers on the security, efficiency, and fault-tolerance of distributed computing systems, with a strong emphasis on blockchain, cloud, and vehicular networks. He develops formal models, algorithms, and protocols that address critical vulnerabilities in decentralized ecosystems, spanning inter-blockchain communication, smart contract migration, and trustworthy governance. His work combines cryptography, game theory, and system design to build scalable, resilient infrastructures. He earned his PhD and MS from the University of Kentucky and BS from the University of Dhaka, Bangladesh.</p><div>Support for this event was provided in part by NSF SFS grant DGE-1753681.</div></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Self-Defending Ledgers: Automating Distributed Ledger Security Using Multi-Agent Reinforcement Learning and Game Theory  Md Tariqul Islam 'Pavel' Assistant...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/153145/guest@my.umbc.edu/5dcdfada3e8d1ed13bcbc15c52cfe17e/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>distributed</Tag>
<Tag>game-theory</Tag>
<Tag>ledger</Tag>
<Tag>multi-agent</Tag>
<Tag>reinforcement-learning</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/145/02862ed6932b1c736b52cec961f25179/xxlarge.jpg?1759412556</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/145/02862ed6932b1c736b52cec961f25179/xlarge.jpg?1759412556</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/145/02862ed6932b1c736b52cec961f25179/large.jpg?1759412556</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/145/02862ed6932b1c736b52cec961f25179/medium.jpg?1759412556</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/145/02862ed6932b1c736b52cec961f25179/small.jpg?1759412556</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/145/02862ed6932b1c736b52cec961f25179/xsmall.jpg?1759412556</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/145/02862ed6932b1c736b52cec961f25179/xxsmall.jpg?1759412556</ThumbnailUrl>
<ThumbnailAltText>Distributed Ledger security</ThumbnailAltText>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 02 Oct 2025 09:47:46 -0400</PostedAt>
<EditAt>Thu, 02 Oct 2025 10:03:56 -0400</EditAt>
</NewsItem>

</News>
