White House Releases Cybersecurity Strategy Focusing on Cryptocurrency, AI, and Quantum Technology
2026-03-23 09:52
Favorite

en.Wedoany.com Report on Mar 23rd, the White House released the "U.S. Cyber Strategy," which includes six major policy thrusts, with particular attention given to protecting critical infrastructure and maintaining an advantage in emerging technologies. The strategy aims to strengthen U.S. cybersecurity and drive technological innovation.

White House

Protecting critical infrastructure is viewed as a rapid disaster response task, involving supply chain security in areas such as the energy grid, financial systems, and data centers. It emphasizes keeping suppliers away from adversaries, promoting U.S. technology, preventing access by opponents, and ensuring resilience.

Maintaining an advantage in critical and emerging technologies includes supporting the security of cryptocurrency and blockchain technology, advancing post-quantum cryptography and secure quantum computing, and safeguarding the artificial intelligence technology stack. The U.S. plans to implement AI-based cyber tools to detect and deflect threat actors while promoting AI safety innovation.

Dr. Gregory Falco, an assistant professor at Cornell University, told S3: "The reason the factor of maintaining an advantage in critical and emerging technologies stands out is that they mention cryptocurrency, quantum, and AI, but not explosives." Lauren Williams, Deputy Director of the Center for Strategic and International Studies, noted that the strategy's strength depends on implementation details.

Megan Moloney, Deputy Director of the Federal Defense and Security Sector, said: "For me, what stands out is the clear offensive shift. It directs the use of 'the U.S. government's defensive and offensive cyber operations' and states that the U.S. 'will not confine our responses to the 'cyber' domain." Lisa Donnan, founder of the Donnan Group, emphasized the importance of talent, pointing to the global shortage of cybersecurity positions.

This bulletin is compiled and reposted from information of global Internet and strategic partners, aiming to provide communication for readers. If there is any infringement or other issues, please inform us in time. We will make modifications or deletions accordingly. Unauthorized reproduction of this article is strictly prohibited. Email: news@wedoany.com