TSMC is dealing with a high-stakes internal security breach after several employees were dismissed over attempts to leak confidential information regarding its 2nm process technology,...
TSMC has dismissed several employees after uncovering unauthorized attempts to access and leak confidential information related to its next-generation 2nm process technology, just...
President Donald J. Trump signed a new executive order on July 31, revising tariffs on imports from various countries to address persistent US trade deficits, with Taiwan facing a...
Chinese regulators have summoned Nvidia to address mounting concerns that its H20 artificial intelligence chip may contain backdoor vulnerabilities and tracking features, in a move...
As generative AI continues to evolve rapidly, Taiwanese enterprises are facing a critical juncture of concurrent technological and organizational transformation. At the
On July 30, US President Donald Trump issued a proclamation declaring that imports of copper and copper-based products threaten national security. The move follows a comprehensive...
IEC 62443 defines procedures for implementing electronic system security in Industrial Automation and Control Systems (IACS). In response to the growing trend of smart industrial...
The global counter-drone systems market is projected to reach US$14.32 billion by 2032 as small unmanned aerial vehicles transform modern warfare, driving demand for detection and...
With the Trump administration set to impose a yet-to-be-defined reciprocal tariff, and the US launching a national security investigation under Section 232 of the Trade Expansion...
South Korea's largest technology platforms are facing scrutiny over inadequate cybersecurity investments following a major breach at SK Telecom, with data showing Naver and Kakao...
Taiwanese Vice President Bi-khim Hsiao has expressed her stance on the US imposition of Section 232 tariffs for the first time, pointing out that the US and Taiwan ultimately have...
The development of quantum computing is fundamentally reshaping the rules of cybersecurity. Traditional public key encryption mechanisms, such as RSA and ECC (Elliptic Curve Cryptography),...
Traditional protection mechanisms are no longer sufficient to address the needs of cyber-physical systems (CPS) that are becoming ubiquitous, with Taiwan-based CHT Security eyeing...
The Belfer Center at Harvard's Kennedy School of Public Policy has released the Critical and Emerging Technologies Index (CETI) report, which quantifies the capabilities of 25 countries...