• CybersecurityPatching Legacy Software Vulnerabilities Rapidly in Mission-Critical Systems

    There are a vast number of diverse computing devices used to run the critical infrastructure our national security depends on – from transportation systems to electric grids to industrial equipment. While the amount of deployed vulnerable software is growing exponentially, the effective means of addressing known vulnerabilities at scale are limited. DARPA seeks to develop targeted software patches to rapidly repair legacy binaries in mission-critical systems, while assuring system functionality is not affected.

  • CybersecurityMaking the Internet Faster, More Secure

    A collaborative effort aims to create a nationwide research infrastructure that will enable the computer science and networking community to develop and test novel architectures that could yield a faster, more secure internet. Dubbed “FABRIC,” the four-year, $20 million project is intended to support exploratory research, at scale, in computer networking, distributed computing systems, and next-generation applications.

  • CybersecurityIn a World of Cyber Threats, the Push for Cyber Peace is Growing

    By Scott Shackelford

    Digital conflict and military action are increasingly intertwined, and civilian targets – private businesses and everyday internet users alike – are vulnerable in the digital crossfire. But there are forces at work trying to promote peace online. It will be a tough challenge.

  • Internet of ThingsRating Security of Internet-Connected Devices

    If you’re in the market for an internet-connected garage door opener, doorbell, thermostat, security camera, yard irrigation system, slow cooker—or even a box of connected light bulbs—a new website can help you understand the security issues these shiny new devices might bring into your home.

  • PerspectiveWinning the Cyber War Is Not a Job the Army Can Do Alone

    Britain has not been legally at war since 1945. Despite this, we have been in perpetual conflict since then and, apart from 1969, have lost soldiers on operations every single year. Today the sphere of that conflict now very much includes the online world where our adversaries – from Russian disinformation disseminators to IS’s terrorist cyber warriors – are a shadowy, but perpetual threat. In this increasingly antagonistic world, we must organize ourselves accordingly.

  • CybersecurityMaking it Easier to Program and Protect the Web

    By Rob Matheson

    Behind the scenes of every web service, from a secure web browser to an entertaining app, is a programmer’s code, carefully written to ensure everything runs quickly, smoothly, and securely. MIT Professor Adam Chlipala builds tools to help programmers more quickly generate optimized, secure code.

  • PerspectiveThe Russian Submarine that Caught Fire and Killed 14 May Have Been Designed to Cut Undersea Internet Cables

    A Russian navy submarine caught fire on Monday, killing 14 sailors on board. Two independent Russian news outlets reported that the vessel was the AS-12 “Losharik,” a nuclear-powered vessel that US officials have said is designed to cut undersea cables that keep the world’s internet running. Alexandra Ma and Ryan Pickrell write in Business Insider that Moscow officials have remained secretive about the type of vessel and whether it was nuclear-powered, prompting accusations of a cover-up. President Vladimir Putin canceled a scheduled event on Tuesday and told his defense minister to “personally receive reports” on the investigation into the accident, Radio Free Europe/Radio Liberty reported.

  • CybersecurityGlobal cybersecurity experts gather at Israel’s Cyber Week

    By Naama Barak

    The magnitude of Israel’s cybersecurity industry was on full show this week at the 9th Annual Cyber Week Conference at Tel Aviv University. The largest conference on cyber tech outside of the United States, Cyber Week saw 8,000 attendees from 80 countries hear from more than 400 speakers on more than 50 panels and sessions.

  • PerspectiveThe U.S. needs an industrial policy for cybersecurity

    Industrial policies are appropriate when market failures have led to the under-provision of a good or service. The cybersecurity industry’s growth has been held back for several reasons, including intractable labor shortages. Vinod K. Aggarwal and Andrew W. Reddie write in Defense One that both the United States and United Kingdom suffer from a documented shortage of skilled programmers and computer scientists working on cybersecurity issues, and the U.S. alone is projected to have a shortage of 1.2 million professionals by 2022, according to the Center for Strategic and International Studies. The market has also been hindered by so-called “information problems,” as firms are often not aware of their own vulnerabilities and avoid sharing information about data breaches given the reputation costs associated with disclosure. So what can the government do about it?

  • China syndromeGoogle cuts Huawei access to Android software updates

    Google said on Sunday it was rescinding Huawei’s license to use Google’s mobile phone operating system Android, and Google services such as Google maps and YouTube. The move will force the Chinese technology company to rely on an open-source version of the software. The move follows a presidential executive order prohibiting American companies from using telecommunications equipment made by “foreign adversaries” viewed as posing a threat to U.S. national security.

  • PerspectiveChina: Determined to dominate cyberspace and AI

    China is chasing dominance in emerging artificial intelligence (AI) technologies in both the private and military sectors, as a central part of its effort to be the leading global cyber power, Chris C. Demchak writes in the Bulletin of the Atomic Scientists. The rise of AI – a subset of cyber as are machine learning, quantum computing, and other new technologies – does not herald a new arms race equivalent to that of the Cold War. Rather, the concern should be on the profound disruption to the existing Westernized global order. In the 1990s, Western nations, led by the United States, created what Demchak calls a “Westernized national creation”: cyberspace. Cyberspace, however, has created a multitude of ubiquitous, embedded vulnerabilities whose easy exploitation directly accelerated the rise of an otherwise impoverished authoritarian and aggressive China. Today, no single democracy has the scale and sufficient resources alone to match the foreknowledge and strategic coherence of the newly confident and assertive China. There is thus a need to create a Cyber Operational Resilience Alliance (CORA) to provide the scale and collective strategic coherence required to ensure the future wellbeing and security of democracy in an overwhelmingly authoritarian, post-Western, cybered world.

  • Software securityEnabling more comprehensive tests on high-risk software

    We entrust our lives to software every time we step aboard a high-tech aircraft or modern car. A long-term research effort has developed new tools to make this type of safety-critical software even safer.

  • CybersecurityCan WiFi networks be completely secure?

    There are many ways in which hackers and crackers can break into a Wi-Fi network. It is trivial if the network uses out of date security protocols or weak passwords. But even if the system is set up with the latest security measures, strong passwords, and firewall and malware protection, there are still ways and means that a malicious third party might access such a network.

  • CybersecurityIdentifying new way to improve cybersecurity

    With cybersecurity one of the nation’s top security concerns and billions of people affected by breaches last year, government and businesses are spending more time and money defending against it. Researchers have identified a new way to improve network security.

  • CybersecurityBiologically inspired network protection software

    Electrical engineers look to the human immune system for clues on how to best protect digital networks. It’s a concept that’s beginning to be explored more and more by researchers in a variety of fields: What does the human body do well and how can we adapt those mechanisms to improve technology or engineering systems?