• Energy companies slow to buy cyberdamage insurance

    The U.S. oil industry will spend $1.87 billion on cybersecurity defense systems by 2018, but less than 20 percent of U.S. companies overall are covered for cyberdamages. “Imagine what could happen if a large refinery or petrochemical facility’s safety monitoring systems were hijacked near an urban area, or a subsea control module was no longer able to be controlled by the people who should be controlling it,” says one expert. “As we’ve all seen from Deepwater Horizon [the 2010 BP Gulf oil spill] those risks and damages can be astronomical. It requires an immediate response.”

  • The CDC contracts Emergent BioSolutions for $18.9 million smallpox treatment

    The CDC has contracted Emergent BioSolutions for the supply of Vaccinia Immune Globulin Intravenous (VIGIV) into the U.S. Strategic National Stockpile (SNS). VIGIV is a therapeutic licensed by the U.S. Food and Drug Administration (FDA) for the treatment of complications due to smallpox vaccination. The contract options are valued at $18.9 million over three years.

  • Financial firms go beyond NIST's cybersecurity framework

    The National Institute of Standards and Technology(NIST) released its Framework for Improving Critical Infrastructure Cybersecurityin February 2014. Utilities, banks, and other critical industries welcomed the guidelines, but many considered the framework to be a baseline for what was needed to continuously protect their networks from cyberattacks. Some financial firms have developed industry-based cyber policies through association such as the Financial Services Information Sharing and Analysis Center’s (FS-ISAC) Third Party Software Security Working Group. The group has been reviewing cyber policies since 2012, before the NIST guidelines were finalized.

  • All-industry cybersecurity association needed: Experts

    A new report is calling for a professional association committed to serving the cybersecurity industry. Theacknowledged the shortage of qualified cybersecurity professionals, as well as the difficulty of recruiting, training, and hiring potential candidates.Experts say that a cybersecurity association could help assess the needs of employers seeking cybersecurity professionals, establish ongoing training and development programs, and also help develop cybersecurity standards across all industries.

  • Program aiming to facilitate cyberthreat information sharing is slow to take off

    President Barack Obama’s 2013 executive orderto improve critical infrastructure cybersecurity allows DHS to expand an information-sharing program, once restricted to Pentagoncontractors, to sixteencritical infrastructure industries. The Enhanced Cybersecurity Servicesprogram transmits cyber threat indicators to selected companies so they may prepare their network protection systems to scan for those indicators. A DHS inspector general (IG) reportreleased on Monday has found that just about forty companies from three of the sixteen industries — energy, communications services, and defense — are part of the program. Moreover, only two ISPs are authorized to receive the indicators.

  • Keith Alexander turns government experience into lucrative private sector career

    Cybersecurity industry insiders are questioning the ethics behind recently retired NSA chief Keith Alexander’s decision to launch IronNet Cybersecurity, a private consultancy, equipped with patents for what he refers to as a game-changing cybersecurity model. Alexander says there is nothing out of the ordinary here. “If I retired from the Army as a brain surgeon, wouldn’t it be OK for me to go into private practice and make money doing brain surgery? I’m a cyber guy. Can’t I go to work and do cyber stuff?”

  • New device sniffs out billions in U.S. currency smuggled across the border

    Criminals are smuggling an estimated $30 billion in U.S. currency into Mexico each year from the United States, but help could be on the way for border guards, researchers reported. The answer to the problem: a portable device that identifies specific vapors given off by U.S. paper money.

  • Utilities increasingly aware of grid vulnerability

    An analysis by the federal government shows that if only nine of the country’s 55,000 electrical substations were shut down due to mechanical failure or malicious attack, the nation would experience coast-to-coast blackout. Another report finds cybersecurity as one of the top five concerns for U.S. electric utilities in 2014. The report also found that 32 percent of the surveyed electric utilities had deployed security systems with the “proper segmentation, monitoring and redundancies” needed for adequate cyber protection.

  • Harris protests FBI’s Motorola radio upgrade contract

    The Harris Corp. has become the second contractor, afterRELM Wireless Corp., formally to protest the FBI’s decision to award a $500 million non-bid contract to Motorola Solutions Inc., claiming the contract to upgrade the FBI’s 30-year-old two-way radio network was “factually unsound, legally unwarranted and wholly unnecessary.”

  • Home Depot faces lawsuit over Joplin, Missouri tornado deaths

    Home Depot is being sued in a wrongful death lawsuit by a woman who lost her husband and two children during a 2011 tornado in Joplin, Missouri. Edie Housel is contending that Home Depot is responsible for the death of her family due to the improper construction of the Home Depot store in which the three — along with five other people — were killed.

  • Philadelphia refines area 911 call locator technology

    In the Philadelphia area and around much of the country, emergency services and first responders are looking to retool the ways in which cell phone locator technology could allow them to aid individuals, and they are calling for the further cooperation of cell phone providers and the government alike. “If you don’t know where the guy is, you can’t help him,” said Edwin Truitt, the Delaware County [Pennsylvania] Emergency Services director.

  • Ebola outbreak could inspire African terrorist groups to weaponize the virus: Experts

    Recent discussions about Ebola have mainly focused on the disease as a public health hazard, but counterterrorism officials are concerned that the new outbreak could inspire terror groups, specifically those based in West Africa, to weaponize the virus. The fear of weaponized Ebola dates back decades to when the Soviet Union’s VECTOR program, aimed at researching biotechnology and virology, was thought to have researched the creation of Ebola for warfare. In 1992 a Japanese cult group called Aum Shinrikyo tried, but failed, to collect samples of the Ebola virus in Zaire.

  • U.S. to impose stricter safety rules on crude oil rail shipment

    The U.S. Department of Transportation(DOT) recently announced proposed rulesbetter to secure train cars and pipelines from oil spills that may lead to fire or accidents in communities across the country. The spills are byproducts of the increase in U.S. oil production and shipments coming from Canada or the Bakken oil fields of North Dakota. The proposed DOT rules would force railroads to upgrade railroad cars used for transporting crude oil, employ better braking systems, and enforce tighter speed controls.

  • Assessing flood risk in a changing climate

    Growing consensus on climate and land use change means that it is reasonable to assume, at the very least, that flood levels in a region may change. In an argument grounded in an analysis of the inherent limitations of statistical analyses, the authors of a new study suggest that researchers’ typical starting assumption that flood behavior is not changing — even in the face of suspected trends in extreme events and knowledge of how difficult such trends are to detect — causes water managers to undervalue flood protection benefits, opening the door to unnecessary losses down the line.

  • Tech firm creates software pairing response systems with open data

    A new application, called Disaster Assessment and Assistance Dashboard (DAAD), harnesses emergency response data in real-time and across multiple departments and agencies. DAAD will function as a central hub for information in the event of a disaster — using more than 100 different interfaces that upload data. Additionally, the hub will work in accordance with all manner of local government organizations such as fire stations, police stations and hospitals to further create a larger picture during the actual moments of an emergency.