-
Cisco survey finds federal executives confident of security efforts
Decision-makers spending more time with manadated security requirements than in recent years; half believe software automation tools will be dominant in the near future; the possibility of reduced operations and security delivery due to security breaches are main areas of concerns
-
-
New study examines government executive perceptions of IPv6 market
Less than a majority expect IPv6 compliance to significantly impact IT purchases; government seen as critical driver of commercial development; federal transition office desired
-
-
U.S. Army in tests of Nokia communication gear
The U.S. Army is interested in a host of communication technologies — WiMAX, WCDMA 3G, GSM — and has signed an R&D agreement with Nokia to test and demonstrate the applicability of these technologies for C3I purposes
-
-
Vigilon opens operation center in Chicago
The State of Illinois is actively seeking homeland security and business continuity companies; the latest to embrace the Windy City is Israeli enterprise security specialist Vigilon, which opens an operation center in Chicago
-
-
Preventing cyberspace gap
Secretary of the Air Force reflects on cyberspace dominance, the information mosaic, and the future of precision strikes
-
-
DHS 2007 R&D budget declines by 22 percent
DHS FY 2007 R&D budget declines overall by about one-fifth, but three areas see increases — cybersecurity, interoperable communications, and radiological and nuclear measures
-
-
NSF funds cybersecurity education
As cybercrimes grow, so does the need for cybersecurity mavens; the NSF gives the University of Pittsburg $1 million to train students in cybersecurity
-
-
Keeping messages over the Internet secure by making them faint
Wireless and Internet communication is vulnerable to eavesdropping and theft; traditional methods of keeping messages secure — encryption and scrambling — may be expensive to implement; two Princeton researchers suggest a new technique to keep transmissions safe, a technique which relies on the properties optical-fiber networks
-
-
Computers to tell fact from opinion in newspaper articles
Inquiring minds want to know whether what people say about the U.S. is based on fact or is mere opinion; DHS has allocated $2.4 million to a consortium of three universities to develop machine-learning algorithms which computers will use to engage more effectively and accurately in information extraction
-
-
Document Security Systems signs secure document deal with South American bank
Company provides secure, verifiable documents that can be transmitted and printed over the internet; DSS a leader in security paper, anti-counterfeiting efforts
-
-
In-Q-Tel names new chief executive
Christopher Darby takes the reigns at the CIA’s venture capital arm; background in cybersecurity; succeeds Amit Yoran
-
-
Engineering Systems Solutions announces successful test of its ForeWarn Universal Communicator
Successful DHS-sponsored simulation is a good sign for company’s ambitious expansion plans; test of the Inmarsat Broadband Global Area Network an even better sign for emergency responders nationwide
-
-
Utility and telecom industries press government for national identification cards
Industries want immediate access to emergency sites; interoperability with FIPS-201-1 a critical issue
-
-
H7 Security Systems, Lincasia in strategic partnership
H7’s Silent Soldier, and intelligent monitoring and surveillance system designed for critical infrastructure, military installations, border crossings, and more, received the prestigious Frost & Sullivan 2006 product innovation award, and has been contracted to deploy it in India and China; the company has entered into a strategic partnership with Lincasia, and will incorporate the latter’s technology into the system
-
-
Probaris helps SSA to come into HSPD-12 compliance
Federal agencies and contractors working with these agencies have until 27 October to comply with various HSPD-12 mandates, chief among them FIPS-201; the SSA is no exception, and it is relying on Probaris for help
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
By Zachary Roth
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
By Dino Jahic
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
By Trina West
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.