-
Global entities come shopping for Israeli cybersecurity
As computer devices and Internet of Things (IoT) connectivity continue to break new boundaries and create changes to our lifestyle, new cybersecurity technologies to defend our tech-savvy lives are crucial. “We’re still at the beginning for the cyber arena. We still need the security solution for smart homes, we still don’t have security solutions for autonomous cars, or for connected medical devices or MRI machines, or for connected kitchen appliances. Every technology that will be introduced to our lives in the coming years will need a cyber solution,” says one expert.
-
-
NSA/DHS endorse DCC cybersecurity program
Virginia Governor Terry McAuliffe on last week praised Danville Community College for becoming the “first rural community college in Virginia” to earn a prestigious cybersecurity designation from the National Security Agency (NSA) and the Department of Homeland Security (DHS). DCC is now one of just four community colleges in Virginia to achieve this milestone, which the governor called “a very big deal” for both attracting new industry and securing digital information.
-
-
Canadian Institute for Cybersecurity launched
The worldwide cybersecurity market is large and growing, with market sizing estimates ranging from $75 billion in 2015 to $170 billion by 2020. The size of the market is a response to the rising global cost of cyberattacks, which is expected to grow to $2.1 trillion by 2020. The Canadian Institute for Cybersecurity, aiming to be a hub for research, training, and industry collaboration, opened at the University of New Brunswick on Monday with more than $4.5 million in funding and the establishment of a research partnership with IBM.
-
-
GCHQ Cyber Accelerator selects first cyber security start-ups
Seven start-ups, focusing on online security issues and threats, will join the new GCHQ Cyber Accelerator, powered by Wayra UK. The accelerator will be part of a government-funded cyber innovation center aiming to help keep the United Kingdom secure online. Each start-up will receive benefits including access to technological and security expertise, networks, office space, and mentoring. The accelerator aims to help the United Kingdom take the lead in producing the next generation of cybersecurity systems, boosting the country’s tech sector.
-
-
$527K to develop a Web authentication middleware tool
Recent studies have documented many problem areas within the current certificate-based authentication system such as errors and issues with server certificates, invalid chains and subjects, self-signed certificates, and popular websites not properly using them. DHS S&T has awarded $527,112 to Brigham Young University (BYU) in Provo, Utah, to develop a Web authentication middleware tool that would significantly upgrade the current Internet website authentication process and improve online security.
-
-
Advancing the science of cybersecurity
Cyberattacks on corporations, agencies, national infrastructure and individuals have exposed the fragility and vulnerability of the internet and networked systems. Achieving truly secure cyberspace requires addressing both the technical vulnerabilities in systems, as well as those that arise from human behaviors and choices. NSF awards $70 million to support interdisciplinary cybersecurity research.
-
-
Cybersecurity policy ideas for a new administration
A new report, Cybersecurity Policy Ideas for a New Presidency, published by the UC Berkeley Center for Long-Term Cybersecurity (CLTC), aims to help the Trump administration prepare to tackle the complex challenge of cybersecurity. “This brief brochure reviews ideas we hope the incoming Trump administration will consider as it develops a new cybersecurity agenda,” the authors write. “We lay out options and programs — some simple, some less so — that the president should consider at each step in his first term.”
-
-
DHS releases Strategic Principles for Securing the Internet of Things
DHS the other day issued a set of Strategic Principles for Securing the Internet of Things (IoT), Version 1.0. These principles highlight approaches and suggested practices to fortify the security of the IoT. They aim to equip stakeholders to make responsible and risk-based security decisions as they design, manufacture, and use internet-connected devices and systems.
-
-
Germany launches broad cybersecurity strategy
The German government on Wednesday adopted a new cybersecurity strategy to counter a rising number of threats targeting government institutions, critical infrastructure, businesses, and citizens. The new strategy was adopted in response to a dramatic increase in sophisticated cyberattacks originating in Russia and China. Chancellor Angela Merkel on Tuesday, and Interior Minister Thomas de Maziere on Wednesday, warned that Russia would be using hacking and disinformation campaign in an effort to influence next year’s election in Germany.
-
-
CyberSeek: An interactive resource for cybersecurity career information
The U.S. rapidly growing cybersecurity jobs market has many more openings available than trained workers to fill them. For example, there are 128,000 positions for “Information Security Analysts,” but only 88,000 workers currently employed in those positions — a talent shortfall of 40,000 workers for cybersecurity’s largest jobs. Jobs requesting cloud security skills remain open ninety-six days on average — longer than any other IT skill. NIST last week introduced CyberSeek, an interactive online tool designed to make it easier for cybersecurity job seekers to find openings and for employers to identify the skilled workers they need.
-
-
Replacing vulnerable password with secure keystroke biometrics
Lapses in computer security can be seen as downright negligent, in a time when major data breaches and leaks dominate international headlines on a regular basis. But it also draws attention to a more compelling question: just how secure are text-based passwords, really? Experts believe that there should be alternatives to the ubiquitous, text-based user authentication method – and that one such alternative is a new method of user authentication using keystroke biometrics.
-
-
The risk of cyber 9/11 or cyber Pearl Harbor exaggerated: Expert
Addressing the implications of cybersecurity threats for the stability of international world order, an expert acknowledged that states will find it difficult to maintain cybersecurity in an increasingly porous and congested cyberspace, but said that cyber-experts exaggerate the threat to essential state infrastructures.
-
-
What CSPs can learn from the latest DDoS attacks
Around the world, communications service providers (CSPs) and subscribers were affected by the 21 October 2016 DDoS attack, making it virtually impossible to reach many popular Web sites for several hours. Although CSPs weren’t targeted directly, they were still affected since the outages drove additional caching DNS traffic caused by the errors from failed DNS requests. This spike in traffic slowed overall network performance, likely driving up customer support call volumes from unhappy subscribers. The attacks highlighted the easily overlooked — yet vital — role that DNS plays on the Internet. An expert offers a few key steps CSPs can take to prepare for similar attacks in the future.
-
-
DHS S&T awards UCSD $1.4 million to measure Internet vulnerabilities
DHS S&T has awarded $1,356,071 to UCSD to develop new capabilities better to enable cyber security researchers to measure the Internet’s vulnerabilities to cyberattacks. The award is part of S&T’s Cyber Security Division’s (CSD) larger Internet Measurement and Attack Modeling (IMAM) project.
-
-
Should NSA and cyber command have separate leadership?
The National Security Agency is the nation’s digital spying organization. U.S. Cyber Command is a military unit focused on cyberwarfare. Does it make sense for one person to lead them both at the same time? I believe that the NSA and Cyber Command should be under separate leadership, so each can pursue its mission with undivided focus and complete intensity. The NSA can gather intelligence. Cyber Command can defend our military networks and be ready to attack the systems of our enemies.
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.