• New York receives $3 million boost for cyber security

    The funding will help New York State’s Office of Cyber Security and Critical Infrastructure Coordination (CSCIC) conduct work with the Multi-State Information Sharing and Analysis Center (MS-ISAC); the MS-ISAC is the first and only facility dedicated to state, local and territorial governments in the country and the funding is expected to enhance the center’s capabilities

  • New communication system to help protect soldiers in the field

    The new technology will use arrays of highly specialized antennas that could be worn by combat troops to provide covert short-range person-to-person battleground communications; the technology will lead to advanced wireless systems that would enable small squads of soldiers to share real-time video, covert surveillance data and tactical information with each other via helmet-mounted visors

  • CSC wins DHS IT infrastructure and cyber security task order

    CSC won a contract to provide information technology infrastructure and cyber support to the National Protection and Programs Directorate’s Office of Cyber Security and Communications; among other things, the company will design and build an expanded watch floor that will integrate national security capabilities from the U.S. Computer Emergency Response Team (US CERT) and the National Coordinating Center of the National Communications System

  • Growth trends in software security favor Beyond Encryption

    Irish company specializing in developing software for protecting sensitive data stands to benefit from growth trends in the global security software market; most encryption products rely on the user having to remember a password to unlock their data; the approach of Beyond Encryption is to have access controlled by an administrator so that the data is protected wherever it goes

  • Day of quantum communications in the theater nears

    The challenges so far with free space optical links, which use fibre optics for transmission, have been the turbulence or distortions from temperature differences that cause motion or wind in the atmosphere; researchers have established an optical link without distortion in test situations at a distance of 35km in stationary and flight situations

  • Counterfeit chips may hobble advanced weapons

    While most computer security efforts have until now been focused on software, tampering with hardware circuitry may ultimately be an equally dangerous threat; the Pentagon now manufactures in secure facilities run by American companies only about 2 percent of the more than $3.5 billion of integrated circuits bought annually for use in military gear

  • H1N1-induced work-from-home may clog Internet

    Telecommuting is a good idea — up to a point; if, as a result of a pandemic, too many people decide to work from home, this could threaten to overwhelm the Internet, rendering it useless as a way for communicating and conducting transactions vital to public safety and the economy

  • The brief

    Vetting a chip with a hidden agenda is not easy, and chip makers cannot afford to test every chip; also, today only Intel and a few other companies still design and manufacture all their own chips in their own fabrication plants; other chip designers — including LSI Corp. and, most recently, Sony — have gone “fabless,” outsourcing their manufacturing to off-shore facilities known as foundries

  • US CERT: BlackBerry app may be spying on you

    A new BlackBerry application has the ability to turn their smartphone into a surveillance tool

  • The brief

    Smart grid technologies may themselves introduce new problems, such as increasing the vulnerability to cyber attack, as power grid resources become increasingly linked to the Internet

  • DHS to boost cybersecurity spending in 2010

    Of the $43 billion DHS 2010 budget, about $397 million is aimed at addressing cybersecurity issues; the amount is $84 million, or about 27 percent, higher than the $313 million that was allocated for information security spending in 2009

  • Vulnerability identified in Amazon's cloud computing

    Researchers show that it is possible to find would-be victims within cloud hardware; cloud technologies use virtual machines — remote versions of traditional onsite computer systems; the number of these virtual machines can be expanded or contracted on the fly to meet demand, creating tremendous efficiencies — but the actual computing is performed within one or more physical data centers, creating troubling vulnerabilities

  • How credible -- and serious -- is the cyber threat the U.S. faces?

    New report examines recent cyber attacks on South Korea and asks whether whether the attacks constituted an act of war and whether they could have been the work of a terrorist group; the answer is no on both counts; the U.S. dependence on digital technology makes it somewhat more vulnerable to cyber attacks than other nations,

  • The brief

    General IT spending by the U.S. government will increase by 3.5 percent a year between 2009 and 2014; during the same time, U.S. government spending on cybersecurity will grow at a compound rate of 8.1 percent a year, and spending on vendor-supplied information security products and services will increase from $7.9 billion in 2009 to $11.7 billion

  • Raytheon buys BBN for $350 million

    The latest example of traditional defense contractors expanding into the information systems sector is Raytheon’s acquisition of Massachusetts-based BBN, the company which put the “@” in e-mail addresses