San Antonio-based Nukudo is bridging the global cybersecurity talent gap through immersive training and job placement in Houston. Photo via Getty Images

It’s increasingly more difficult to ensure the confidentiality, integrity, and availability of proprietary data and information in the ever-changing, ever-evolving digital world.

Cyberattacks, including malware, phishing, and ransomware, are becoming increasingly common and sophisticated, posing a consistent threat to a company’s sustainability and bottom line.

To combat that trend, Nukudo, a San Antonio-based cybersecurity workforce development company, is expanding its initiative to bridge the global cybersecurity talent gap through immersive training and job placement to Houston.

“We saw that there was a need in the market because there's a shortage of skilled manpower within the cybersecurity industry and other digital domains,” says Dean Gefen, CEO of NukuDo. “So, our initial goal was to take a large pool of people and then make them to be fully operational in cybersecurity in the shortest amount of time.”

The company refers to the plan as the “training-to-employment model,” which focuses on providing structured training to select individuals who then acquire the skills and knowledge necessary to secure and maintain fruitful careers.

The company identifies potential associates through its proprietary aptitude test, which recognizes individuals who possess the innate technical acumen and potential for success in various cybersecurity roles, regardless of their level of education.

“We take in people from all walks of life, meaning the program is purely based on the associate’s potential,” Gefen says. “We have people who were previously aircraft engineers, teachers, graphic designers, lawyers, insurance agents and so forth.”

Once selected, associates are trained by cybersecurity experts while gaining hands-on experience through scenario-based learning, enabling them to be deployed immediately as fully operational cybersecurity professionals.

The program training lasts just six months—all paid—followed by three years of guaranteed employment with NukuDo.

While in training, associates are paid $ 4,000 per month; then, they’re compensated by nearly double that amount over the next three years, ultimately pushing their salaries to well into the six figures after completing the entire commitment.

In addition to fostering a diverse talent pipeline in the cybersecurity field, NukuDo is creating a comprehensive solution to address the growing shortage of technical talent in the global workforce.

And arming people with new marketable skills has a litany of benefits, both professional and personal, Gefen says.

“Sometimes, we have associates who go on to make five times their previous salary,” says Gefen. “Add to that fact that we had someone that had a very difficult life beforehand and we were able to put him on a different path. That really hits home for us that we are making a difference.

Nulkudo currently has partnerships with companies such as Accenture Singapore and Singapore Airlines. Gefen says he and his team plans to have a new class of associates begin training every month by next year and take the model to the Texas Triangle (Houston, Austin and Dallas)—then possibly nationwide.

“The great thing about our program is that we train people above the level of possible threat of replacement by artificial intelligence,” Gefen says. “But what we are also doing, and this is due to requirements that we have received from clients that are already hiring our cyber professionals, is that we are now starting to deliver AI engineers and data scientists in other domains.”

“That means that we have added more programs to our cybersecurity program. So, we're also training people in data science and machine learning,” he continues.

All interested candidates for the program should be aware that a college degree is not required. NukuDo is genuinely interested in talented individuals, regardless of their background.

“The minimum that we are asking for is high school graduates,” Gefen says. “They don't need to have a college degree; they just need to have aptitude. And, of course, they need to be hungry to make this change.”

Texas saw a 440 percent jump in business investments between 2019 and 2024, according to a new report. Photo via Getty Images

Texas tops ranking of best states for investors in new report

by the numbers

Texas ranks third on a new list of the best states for investors and startups.

Investment platform BrokerChooser weighed five factors to come up with its ranking:

  • 2024 Google search volume for terms related to investing
  • Number of investors
  • Number of businesses receiving investments in 2024
  • Total amount of capital invested in businesses in 2024
  • Percentage change in amount of investment from 2019 to 2024

Based on those figures, provided mostly by Crunchbase, Texas sits at No. 3 on the list, behind No. 1 California and No. 2 New York.

Especially noteworthy for Texas is its investment total for 2024: more than $164.5 billion. From 2019 to 2024, the state saw a 440 percent jump in business investments, according to BrokerChooser. The same percentages are 204 percent for California and 396 percent for New York.

“There is definitely development and diversification in the American investment landscape, with impressive growth in areas that used to fly under the radar,” says Adam Nasli, head analyst at BrokerChooser.

According to Crunchbase, funding for Texas startups is off to a strong start in 2025. In the first three months of this year, venture capital investors poured nearly $2.9 billion into Lone Star State companies, Crunchbase data shows. Crunchbase attributes that healthy dollar amount to “enthusiasm around cybersecurity, defense tech, robotics, and de-extincting mammoths.”

During the first quarter of this year, roughly two-thirds of VC funding in Texas went to just five companies, says Crunchbase. Those companies are Austin-based Apptronik, Austin-based Colossal Biosciences, Dallas-based Island, Austin-based NinjaOne, and Austin-based Saronic.

Photo by Adi Goldstein on Unsplash

A legacy of industrial technology excellence: UTSI International turns 40

Cheers to 40 Years

As UTSI International celebrates its 40th anniversary, president and CEO Shaun Six reflects on the company's history, achievements, and exciting future.

---

In March 1985, Dan Nagala and a few friends took a risk, leaving their full-time jobs to pursue their passion and start their own company.

They founded UTSI International amidst groundbreaking advancements in Industrial Control Systems and SCADA technology, revolutionizing remote operations for critical infrastructure. From the start, UTSI has been at the forefront of OT innovation and integration — a legacy we proudly carry forward today.

The legacy of Dan Nagala

Dan Nagala’s 50-plus-year career is too vast to cover every accomplishment, but if you’ve ever heard the phrase “Houston, we have a problem” in a movie, those screens in the control room and the logic causing the “blinky lights” to alert the operators, you’ve seen some of his work. Dan and his team ultimately paved the way for field communications to detect and communicate leaks on pipelines and give operators in remote locations situational awareness, expanding their ability to safely monitor and control their operations.

This capability was requested early on in the first pipeline control rooms, leading to UTSI’s first check-in 1985 (which I proudly have framed on my bookshelf). The protocols to communicate and do advanced calculations — which many would be tempted to call AI today — for the purpose of monitoring and control, was created from this group of enthusiasts who open sourced it and allowed it to proliferate, leading to over 80 percent of all critical infrastructure in the world now utilizing a variant thereof.

Given the novelty of the technology and the experience of UTSI, having implemented control systems and automation for pipelines in over 22 countries, Dan was asked to collaborate with industry experts, creating the first API leak detection and control room management standards for the American Petroleum Institute. These would later become regulation under PHMSA, DoT, and TSA, placing UTSI as the go-to experts in compliance in addition to their traditional expertise.

UTSI has delivered for the world’s largest infrastructure owners in multiple critical infrastructure sectors, like mining, water/wastewater, oil and gas, green energy, transportation authorities, etc. We have also done AI and cybersecurity, in addition to SCADA and ICS work for the DoD and DoE.

Strength in partners

I joined UTSI in 2022 as vice president, working under Dan, with the goal of gradually stepping into leadership. In 2023, I became CEO, president, and majority shareholder. While no one can truly fill Dan’s shoes alone, we’ve focused on strengthening our team, partnerships, and capabilities to continue UTSI’s legacy of excellence.

One of our first strategic partnerships was with Tory Tech, a leading API-compliant Control Room Management tool. UTSI has worked as integrators with Tory Tech for years and Dan worked as a CRM compliance advisor for them in the U.S. while they were setting up their headquarters in Houston. In 2024 we made it an official partnership, becoming a preferred integrator and focusing our team on training and development in the MaCRoM (Master Control Room Management) tool.

We've also made significant investments in our OT cybersecurity capabilities, expanding our team and partnering with industry leaders like Dennis Parker, Derrik Oates, Nozomi Networks, Fortinet, and Schneider Electric. These strategic moves ensure we deliver top-tier expertise, products, and solutions to better serve our customers.

Our partnership with ThreatGEN and the utilization of their AI-driven “AutoTableTop” tool not only utilizes our experience with TSA guidelines, but adds an element of reality that the traditional methods are lacking, making these engagements more interactive and beneficial for operators who are required to participate annually.

In 2024, UTSI also invested heavily in AI and Data Science by acquiring Houston-based AI company Pandata Tech and leveraging their Data-Quality-Methodology (DQM), Leak Geek, and time-series data science expertise to solve industry specific problems.

Moving up – in and around Houston

Building on our recent successes, we strategically relocated our office to the Netrality building (1301 Fannin St.), bringing us closer to clients and partners, while getting access to a Tier 3 Data Center with an uninterrupted 40-year power record.

Netrality is a SOC2-compliant facility with seven points of detection from the street to our server, including biometric screening. Our very own Roberto deLeon has architected our upgraded servers using the Purdue model as a basis of design while leveraging our relationship with Fortinet to standardize our hardware and software to the highest standards. We practice what we preach — every architecture, framework, and hardware recommendation we make is not just advised but actively implemented within our own operations.

Our investment in this space includes increasing our “SCADA R&D Lab” to play with toys from vendors, testing them out in our environment before we recommend and advise them to our clients and partners. Currently we’re working on LLMs for OT, building our own “DANN2.0” for use in-house. DANN is an homage to Dan Nagala (and, for the nerds, stands for Dan Artificial Neural Network), which we started in 2022 when I realized that knowledge capture is an industry wide epidemic and we need to be ready to integrate for our clients in a safe and local way at scale, in the OT environment.

Additionally, having come from a startup before joining UTSI, I wanted to get us closer to the heart of innovation, so we’ve added additional office space at The Cannon downtown. While there are many tech hubs around Houston, and we are proud to work with and partner with companies from Greentown Labs and the Ion, to name a few, we’ve found that The Cannon community is incredibly active and innovative, with experience in industrial use-cases.

Houston is set to become the Energy Transition capital, leading in hydrogen, carbon capture, and repurposing. With a 5:1 ratio of engineers leaving the industry and an average age over 60, we must innovate. The solution lies in combining a secure, cloud-free "ChatGPT for OT" with digital twins. Bringing the field to engineers is essential. We've partnered with a satellite constellation for asset imaging and U.K.-based Mods Solutions to leverage their CFIHOS-driven platform for intelligent digital twins — more on that partnership soon!

And we will need to leverage enhanced automation tools and actively monitor control networks to ensure security and respond quickly to issues, which is why we’ve partnered with Nozomi Networks.

Shaping the future

Although Dan has semi-retired to his cabin in Montana, he continues to do “the fun stuff” that brings him joy, such as conducting research for PRCI and assisting long-time clients. He also has been a mentor and advisor to me since I started at UTSI three years ago. I’m grateful for him and the group of industry experts he gathered around him to make UTSI such a well-known systems integrator and OT advisor for the world’s largest asset owners.

Our group of experts are active in the industry and will be speaking at events throughout the year, with a presence at Entellec, Level Zero, and participating at this year's API Cybernetics and PSIGs biannual conferences. We proudly serve on the BCarbon advisory board and GHPs Energy Committee.

Lastly, we have one request: We see a critical need for H2 and supercritical CO2 studies to develop simulation models, response plans, and leak detection best practices. These gases differ from those covered in existing standards. If you know anyone interested in funding or contributing, we’re collaborating with industry partners to secure support.

Courtesy photo

UTSI's advisory board digs into cybersecurity's challenges, trends + tech

From The Board

In today's digital landscape, the convergence of Information Technology (IT) and Operational Technology (OT) presents both opportunities and challenges for critical infrastructure asset owners and operators.

UTSI, a leading systems integrator of OT technology, has assembled an OT Cybersecurity Advisory Board to address these challenges and highlight standard processes and best practices to evaluate and secure these environments.

“We are excited about the strength of our esteemed Advisory Board and are confident that these strategic alliances will enhance our competitiveness,” says Shaun Six, president of UTSI International.

A few of the drivers of OT and IT convergence include increased efficiency, enhanced data, and improved remote monitoring and control capabilities. It exists to promote the promise of connectivity, data visualization, and to enable AI and better decision-making.

Key challenges
However, there are challenges. Increased attack surface, legacy systems, and infrastructure, as well as differing security requirements and regulatory and compliance challenges are all present.

“As we witnessed our global infrastructure recover from the largest outage on July 19, this is a clear and present example of how the application of technology between IT/OT can have an impact on the underlying interdependencies in critical systems and infrastructure," says Cherise Esperaza, co-founder and president of Security Gate. "Therefore, there is an ever-increasing need for resources to be expended for this endeavor, and understanding the areas of risk alongside business outcomes as it relates to the convergence will be a critical to ensuring optimal availability of these systems.”

Increased monitoring

When it comes to security monitoring and incident response, it's vital to incorporate new tools to monitor, meeting the same standards as legacy assets and reporting vulnerabilities.

"Continuous monitoring is one of the most critical aspects of securing your IT/OT infrastructure," offers Eric Rippetoe, former CISO of Federal Energy Regulatory Commission and UTSI cybersecurity consultant. "Automated tools coupled with mature processes allow organizations to rapidly detect security threats and enable teams to quickly respond to address issues. Having a security incident and not knowing about it could result in huge remediation costs and major long-term reputational damage."

Emerging technology and trends
With the rise of AI, it makes sense now more than ever to follow the principle of "never trust, always verify." A Zero Trust architecture is a strategic approach to cybersecurity that secures an organization by eliminating implicit trust and continuously validating every stage of a digital interaction.

In line with this approach, UTSI International Corporation, as a Gold Partner of ThreatGEN, has been intensively utilizing ThreatGEN's AutoTableTop™ incident response tabletop exercise simulation tool. This advanced technology is helping UTSI provide meaningful tabletop exercises to their client base, particularly in high-risk SCADA and OT environments.

Clint Bodungen, president of ThreatGEN, emphasizes the tool's significance: "This tool is designed to sharpen incident response capabilities for teams operating in critical SCADA and OT environments. In these high-stakes settings, where system availability is paramount and the consequences of failure can be catastrophic, AutoTableTop™ provides an unparalleled platform for realistic, AI-driven tabletop exercises. It allows teams to practice and refine their responses to a wide range of scenarios, with practically zero planning time required, ensuring they're prepared for the unique challenges posed by industrial control systems where even a minor slip-up could have deadly consequences. This application of advanced simulation technology aligns with the industry's move towards more robust and realistic cybersecurity training, especially in sectors where the stakes are exceptionally high."

In conclusion
The convergence of IT and OT presents significant cybersecurity challenges for critical infrastructure. However, by understanding these challenges and implementing effective strategies, organizations can protect their essential systems from cyber threats.

“Maintaining an accurate inventory of assets poses a significant challenge for companies with control system networks," says Derek Harp, chairman, Control System Cyber Security Association International. "As outlined in our 2024 OT Cybersecurity Technology Report, not only is it difficult to identify these assets, but understanding their communication adds an additional layer of complexity. Typically, companies only gain a snapshot of their OT network status and assets' interactions during periodic assessments. Not surprisingly, our research also indicates that the frequency of these critical evaluations is increasing.”

The role of UTSI's OT Cybersecurity Advisory Board, along with the use of advanced tools like Security Gate and ThreatGEN, is pivotal in navigating this complex landscape. As the threat landscape continues to evolve, proactive measures and ongoing investment in cybersecurity will be crucial to safeguarding our most critical assets.

There are three topics in particular that business owners should refresh and/or make sure they include in their HR policies and employee handbook. Photo via Getty Images

3 things Houston companies need to freshen up when it comes to their HR practices

guest column

Just as we typically look to freshen up our homes this time of year, the same needs to be done for employee handbooks. Employee handbooks streamline HR operations, mitigate risks and set expectations to protect a business from negative workplace behavior by outlining employee policies and procedures.

There are three topics in particular that business owners should refresh and/or make sure they include in their HR policies and employee handbook: in-office attendance, social media and artificial intelligence (AI).

In-office attendance

When taking a closer look at hybrid workplace policies, the in-office attendance policies should align with your organizational goals. Whether you decide to implement hybrid work permanently or eventually return to being in the office completely, the return-to-office (RTO) policies should reflect those goals.

Clear expectations are especially important when defining office attendance rules. When attendance policies are set, employees respond best when they are fair, accessible and easily understood. Detailed policies outlining the nuances and consequences can help reduce noncompliance while supporting accountability.

Policies need consistent enforcement for them to be effective. Hybrid policies set prior to or during the pandemic may now be loosely enforced. The policies may state for employees to be in the office three days a week, but there may be no accountability for not meeting the mandate. Not enforcing attendance policies can give the impression that it is okay to violate other policies, too. Reviewing your policies allows you to course correct and write a policy reflecting your corporate culture and goals. You’ll then be able to reintroduce the attendance policy and enforce it across the board as intended.

Social media

You are hard pressed to find an employee without a social media account, whether it is TikTok or LinkedIn. If your business does not have a social media policy with guidelines surrounding employees’ online behaviors, now is the time to put one in place. If you do have a policy, social media changes quickly enough to warrant an annual review.

Social media policies should set boundaries between personal and professional use of social media. Employee activity on social media outside of work can influence business, as employees are often seen as reflecting the company. It is also important to note that social media policies should be based on input from senior management, HR, legal and IT, not just marketing.

The social media policy should delineate between an employee’s personal and professional use, establish a code of conduct and outline its use as part of crisis communications. Social media can just as easily elevate your brand, and you can potentially ask employees to share positive work experiences online.

Cybersecurity should also be addressed in social media policies. As it has become more common for hackers to infiltrate personal emails and social media accounts, policies can prohibit employees from storing company documents in their personal social media and email accounts for security purposes.

Artificial Intelligence (AI)

AI seems to be changing the way we do business daily. However, the policies surrounding company use of AI are lacking at many organizations. Research from McKinsey states only one in five employers have established policies governing their employees use of AI.

AI technology has already streamlined many business practices, but it can also present major risks. Inaccuracy can threaten your business if employees use generative AI for assistance in completing writing tasks, for instance, and the system may not generate accurate or original information.

As we learn the evolving and complex nuances of AI, creating a policy needs careful attention. You may consider developing an AI team to write a comprehensive, well-researched AI policy tailored to your organization. This working group should gather insights from leaders within the organization, including frontline managers, to fully understand how employees use, or might use, AI. This team should be charged with considering the ethical aspects of AI’s use and ensuring the policy aligns with company values.

One of the most critical elements of the policy is an accountability process or system. The policy should clearly outline any corrective action or disciplinary steps associated with using AI in a manner that harms the business and/or its clients. Just as important, the policy should outline how to use and how to avoid misusing AI. Since AI continues to evolve month to month, this is a policy that will require more attention and revisioning throughout the year.

Keeping a critical eye on HR policies is an important part of business success. Setting aside time to review, update and even create new policies now – before being faced with an issue – can potentially mitigate costly challenges down the road.

------

Karen Leal is performance specialist with Houston-based Insperity, a provider of human resources offering a suite of scalable HR solutions available in the marketplace.

Stay informed and regularly check your security procedures to protect yourself, your business, and your customers. Photo via Getty Images

Houston founders: How safe is your company's data?

guest column

As news comes out every week about new technologies, from new crypto wallets to generative AI to self-driving taxis, it can get overwhelming for most of us to keep up or to understand the new intricacies of technology, and it can get easy to say, “The IT department has it covered.” Well, do they have it covered?

Far too often, companies fail to protect its data with the same muster as its financial security until it is too late. Just as a healthy business will regularly conduct audits of its accounting processes to detect potential fraud, ensure regulatory compliance, and locate areas of improvement for the organization, the same should be done for a business’s data security practices. Key components of any organization are its people and its information, and the IT department is in charge of protecting that information.

We as business people need to ensure that the company’s technology personnel are indeed securing one of the company’s most valuable assets: information.

Big picture: Your business needs to follow an audit process

  1. Confirm the scope of your data
  2. Conduct an internal review of all security practices
  3. Conduct a review of all vendor practices that have access to your data
  4. Confirm compliance with regulations and contractual obligations
  5. Prepare a report with detailed findings and recommendations to improve on year-over-year

Data: What do you have and what duties does it require?

Personal information, particularly when it belongs to customers, is the most frequently compromised type of data. Under laws like the newly passed Texas Data Privacy and Security Act (TDPSA), businesses can have additional obligations to keep this information protected. Personal information can include any information “that is linked or reasonably linkable to an identified or identifiable individual.”

Sensitive data also requires extra precaution, which means protecting (1) personal data that reveals racial or ethnic origin, religious beliefs, mental or physical health diagnosis, sexuality, or citizenship or immigration status; (2) genetic or biometric data that is processed for the purpose of uniquely identifying an individual; (3) personal data collected from a known child; or (4) precise geolocation data.

Other types of data to watch out for include the business’s intellectual property, anonymized customer data, employee personal information, and any other type of proprietary business data. Depending on the industry, the cost of a breach of any of these types of data could be incredibly high, particularly for healthcare and finance.

Ultimately, Texas businesses are required to maintain reasonable procedures to protect personal information, and there may be other laws implicated such as HIPAA, GLBA, CCPA/CPRA, BIPA, GDPR, PIPEDA, and many more, depending on where business is done, the industry implicated, and, in some cases, where customers are located.

"But I think the vendor is responsible."

Check your contracts, and check if the law requires you to have a duty to protect the compromised information, as many do. Involve your IT department in the review of technical compliance whenever you are sharing data with a third party. Further, it is important to make sure that however the Data Processing Addendum says the vendor is processing data is how they are actually processing data. To that point, if you are processing someone else’s data, your business also needs to be doing what it says it is doing, in contracts with third parties and in your Privacy Policy.

Software as a service arrangements, end user license agreements, and other internet and software-based services may require you to hand over data and not give you the opportunity to customize and shift risk. This is why it is important to thoroughly evaluate what technical protections are in place because the risk and duty may still fall on your business regarding the data of your customers and employees. Ask yourself (or your IT professionals) if the vendor actually needs the data they receive to provide services to you.

Key takeaway: Stay informed

Your business needs checks and balances in place with the IT department to ensure you know what they are (or are not) doing and what they are supposed to do. You need policies and procedures, and they need to regularly be tested.

Do you know where your data is stored, both internally and with third parties? Who controls it? How is it being processed, and is anything being shared? Are encryption procedures in place? Firewalls, Intrusion Protection Systems, and End-Point Detection and Response? Do you and your vendors have Incident Response Plans? Stay informed and regularly check your security procedures to protect yourself, your business, and your customers.

------

Courtney Gahm-Oldham is partner at Frost Brown Todd. Lauren Cole is associate at Frost Brown Todd.

Ad Placement 300x100
Ad Placement 300x600

CultureMap Emails are Awesome

Microsoft partners with Rice University's OpenStax on AI teaching tool

group project

Rice University’s OpenStax and Microsoft are partnering to integrate the nonprofit’s content with the tech giant’s AI innovation, known as Learning Zone.

“At OpenStax, our mission is to make an amazing education accessible to all,” Richard G. Baraniuk, founder and director of OpenStax, said in a news release. “That’s why we’re excited to integrate our trustworthy, peer-reviewed content with Microsoft’s AI technology through the Microsoft Learning Zone. Together, we aim to help more instructors and their students access engaging, effective learning experiences in new and dynamic ways. We also share a strong commitment to the thoughtful and responsible application of AI to better ensure all learners can succeed.”

OpenStax is a provider of affordable instructional technologies and is also one of the world’s largest publishers of open educational resources (OER).

Microsoft Learning Zone promises to provide educators and students with “responsible AI technology and peer-reviewed educational content to support learning” on Microsoft Copilot+ PCs. Microsoft Learning Zone works by utilizing on-device AI to generate interactive lessons for students, and its integration with OpenStax content means educators can rely on OpenStax’s digital library of 80 openly licensed titles.

The goal is for educators to create effective and engaging learning experiences safely, thereby bypassing the need to source and vet content independently. Included is a library of ready-to-use lessons, opportunity for immediate feedback and differentiated learning. Educators will maintain control of instructional content and pedagogical strategies and will be able to update or edit lessons or activities prior to sharing them with students.

Other tools included in the Microsoft Learning Zone are additional languages, reading coaching, public speaking help, math and reading progress, and a partnership with the online quiz platform Kahoot!

OpenStax resources have been reported as used across 153 countries, and this current collaboration combines the power and potential of responsible AI usage in education with content that has been utilized by 13,569 K-12 schools and 71 percent of U.S. colleges and universities, according to Rice.

“Through our partnership with OpenStax, we’re combining the power of on-device AI in Copilot+ PCs with OpenStax’s trusted and diverse peer-reviewed content to help educators quickly create high-quality, personalized, engaging lessons,” Deirdre Quarnstrom, vice president of Microsoft Education, added in the news release. “We’re excited about how this collaboration will empower classrooms globally.”

Houston ranks among the 15 best cities in America for 2025

Ranking It

A new national report ranking the best cities in America has declared Houston is the 13th best U.S. city in 2025.

The annual "America's Best Cities" report from Resonance Consultancy, a Canada-based real estate and tourism marketing firm, ranks the relative qualities of livability, cultural "lovability," and economic prosperity in America's principal cities with metropolitan populations of 500,000 or more.

These top 100 cities "brilliantly weave local culture with economic prospects, aligning with global and domestic travel trends to create premier experiences for both residents and travelers."

Houston's new placement is three spots lower than its triumphant No. 10 rank in 2024. Though it no longer holds a prized top-10 spot, the report hails Houston as a "coveted hometown for the best and brightest on earth."

Among Houston's other shining attributes are its booming population growth – which has now grown to a staggering 7.51 million people – plus its competitive real estate market and a vibrant hospitality and culinary scene. Additionally, Houston earned a well-deserved No. 4 rank in the report's "restaurants" subcategory.

"A 221-room Home2 Suites/Tru by Hilton debuted near Toyota Center in March, while Marriott’s newly renovated Residence Inn NASA/Clear Lake keeps surging visitors happy," the report said. "West Houston’s Greenside will convert 35,000 square feet of warehouses into a park-laced retail hub by 2026, while America’s inaugural Ismaili Center, rising along Allen Parkway, remains on schedule for later this year, adding yet another cultural jewel to H-Town’s festival-fueled mosaic."

The report additionally puts a large focus on Houston's innovative energy sector and its numerous large companies that boost the local economy and create thousands of jobs. Several of these Houston-based companies are some of the best places to work, according to U.S. News and World Report.

One such company that was specifically praised in the report was the HyVelocity Hub, which aims to "ensure economic resilience and long-lasting, domestic energy production" along the Gulf Coast.

"The HyVelocity Hydrogen Hub just locked in up to $1.2 billion from the U.S. DOE, targeting 45,000 jobs and slicing 7.7 million tons of CO₂ a year," the report said.

Elsewhere in Texas

Dallas (No. 14) and Austin (No. 15) ranked right behind Houston in the top 20, while San Antonio sank into the No. 41 spot after previously ranking 32nd last year. El Paso also fell from No. 83 in 2024 to No. 100 this year.

Jason McGrath, the executive vice president and head of U.S. Corporate Reputation at Ipsos, said in the report that American cities are proving their resiliency as they are faced with "climate issues, increasing infrastructural demands, and shifting geopolitical landscapes affecting international relations and travel."

"Despite these hurdles, cities are creatively reinventing themselves to shine as examples of cultural vibrancy and innovation, keeping their competitive edge both locally and globally," McGrath said. "Our report shows that the allure of American cities remains strong, thanks to their rich diversity and vast attractions — from natural wonders to buzzing cultural hubs."

The top 10 best cities in America in 2025 are:

  • No. 1 – New York City, New York
  • No. 2 – Los Angeles, California
  • No. 3 – Chicago, Illinois
  • No. 4 – San Francisco, California
  • No. 5 – Seattle, Washington
  • No. 6 – Miami, Florida
  • No. 7 – Boston, Massachusetts
  • No. 8 – Washington, D.C.
  • No. 9 – Las Vegas, Nevada
  • No. 10 – San Diego, California
---

This article originally appeared on CultureMap.com.

Houston biosciences company opens new sequencing center for drug development

bioscience breakthroughs

Houston-based Avance Biosciences has launched the Next-Generation Sequencing Center of Excellence, designed to enhance the company’s sequencing capabilities for drug development. Specifically, the facility at the company’s main campus in Northwest Houston will pursue breakthroughs in biologics, cell therapy and gene therapy.

In the drug industry, sequencing refers to studying nucleotides in DNA and RNA molecules. Nucleotides are the building blocks of DNA and RNA.

“This is a major milestone for Avance Biosciences as we continue to support the evolving needs of biologics and cell and gene therapy developers,” Xuening “James” Huang, co-founder, CEO and chief technology officer of Avance, said in a news release. “By consolidating state-of-the-art sequencing platforms and scientific talent, we’ve created a highly capable organization ready to solve complex genomic challenges with precision and compliance.”

In 2013, Avance rolled out next-generation sequencing (NGS) that complies with federal guidelines. Since then, Avance “has remained at the forefront of regulated sequencing services,” the company said. “The launch of the (new center) strengthens the company’s ability to deliver accurate, reproducible, and regulatory-aligned sequencing data across a wide array of therapeutic modalities.”

Cal Froberg, senior vice president of sales and marketing at Avance, said pharmaceutical and biotech clients trust the company’s technical capabilities and regulatory compliance.

“With the ever-changing global landscape and increasing scrutiny around international sample shipments, conducting advanced, cost-effective NGS testing domestically is now more feasible than ever,” Froberg said. “Our clients have confidence that their samples will remain in the U.S.”

Avance, founded in 2010, plans to hold an open house at the new facility in September to showcase its capabilities, technology, talent, and services. The company’s services include sequencing, molecular biology, cell-based testing, and bioanalytical testing.