-
Ebola vaccine to be tested on humans
Efforts to test an Ebola vaccine on humans have reached a milestone when BioProtection Systems, through its parent company, NewLink Genetics Corporation, confirmed that it is prepared to launch the first human safety trial of a vaccine, which the company licensed after it was developed by scientists at the Public Health Agency of Canada. Thevaccine replaces the genes from vesicular stomatitis virus (VSV), a pathogen found in livestock, with a gene from the Ebola virus. The Ebola gene then develops a harmless protein that sits on the virus’s outer coat.
-
-
Containing the international spread of Ebola
The West African Ebola virus outbreak is already the largest of its kind, both in terms of numbers and geography. And with the most distant parts of the world less than a day’s flight away, it isn’t too difficult to imagine Ebola virus spreading. During the SARS outbreak, both exit and entry screening strategies failed to detect many cases. The virus spread from Asia to various parts of the world, especially to Canada. But despite the limited detection rate of the airport screening process during the SARS outbreak, it was still thought to be a useful way to educate incoming travelers about what to do and where to go if they became sick.
-
-
Financial firms go beyond NIST's cybersecurity framework
The National Institute of Standards and Technology(NIST) released its Framework for Improving Critical Infrastructure Cybersecurityin February 2014. Utilities, banks, and other critical industries welcomed the guidelines, but many considered the framework to be a baseline for what was needed to continuously protect their networks from cyberattacks. Some financial firms have developed industry-based cyber policies through association such as the Financial Services Information Sharing and Analysis Center’s (FS-ISAC) Third Party Software Security Working Group. The group has been reviewing cyber policies since 2012, before the NIST guidelines were finalized.
-
-
All-industry cybersecurity association needed: Experts
A new report is calling for a professional association committed to serving the cybersecurity industry. Theacknowledged the shortage of qualified cybersecurity professionals, as well as the difficulty of recruiting, training, and hiring potential candidates.Experts say that a cybersecurity association could help assess the needs of employers seeking cybersecurity professionals, establish ongoing training and development programs, and also help develop cybersecurity standards across all industries.
-
-
Program aiming to facilitate cyberthreat information sharing is slow to take off
President Barack Obama’s 2013 executive orderto improve critical infrastructure cybersecurity allows DHS to expand an information-sharing program, once restricted to Pentagoncontractors, to sixteencritical infrastructure industries. The Enhanced Cybersecurity Servicesprogram transmits cyber threat indicators to selected companies so they may prepare their network protection systems to scan for those indicators. A DHS inspector general (IG) reportreleased on Monday has found that just about forty companies from three of the sixteen industries — energy, communications services, and defense — are part of the program. Moreover, only two ISPs are authorized to receive the indicators.
-
-
Two major security vulnerabilities found in majority of world’s smartphones
Researchers have uncovered two major vulnerabilities in smart phones from manufacturers including Apple, Google Android, and Blackberry, among others. These flaws could put up to 90 percent of the world’s two billion smartphones at risk for stolen data, password theft, and the potential for hackers even to take control of the device.
-
-
Keith Alexander turns government experience into lucrative private sector career
Cybersecurity industry insiders are questioning the ethics behind recently retired NSA chief Keith Alexander’s decision to launch IronNet Cybersecurity, a private consultancy, equipped with patents for what he refers to as a game-changing cybersecurity model. Alexander says there is nothing out of the ordinary here. “If I retired from the Army as a brain surgeon, wouldn’t it be OK for me to go into private practice and make money doing brain surgery? I’m a cyber guy. Can’t I go to work and do cyber stuff?”
-
-
New device sniffs out billions in U.S. currency smuggled across the border
Criminals are smuggling an estimated $30 billion in U.S. currency into Mexico each year from the United States, but help could be on the way for border guards, researchers reported. The answer to the problem: a portable device that identifies specific vapors given off by U.S. paper money.
-
-
Utilities increasingly aware of grid vulnerability
An analysis by the federal government shows that if only nine of the country’s 55,000 electrical substations were shut down due to mechanical failure or malicious attack, the nation would experience coast-to-coast blackout. Another report finds cybersecurity as one of the top five concerns for U.S. electric utilities in 2014. The report also found that 32 percent of the surveyed electric utilities had deployed security systems with the “proper segmentation, monitoring and redundancies” needed for adequate cyber protection.
-
-
Harris protests FBI’s Motorola radio upgrade contract
The Harris Corp. has become the second contractor, afterRELM Wireless Corp., formally to protest the FBI’s decision to award a $500 million non-bid contract to Motorola Solutions Inc., claiming the contract to upgrade the FBI’s 30-year-old two-way radio network was “factually unsound, legally unwarranted and wholly unnecessary.”
-
-
Home Depot faces lawsuit over Joplin, Missouri tornado deaths
Home Depot is being sued in a wrongful death lawsuit by a woman who lost her husband and two children during a 2011 tornado in Joplin, Missouri. Edie Housel is contending that Home Depot is responsible for the death of her family due to the improper construction of the Home Depot store in which the three — along with five other people — were killed.
-
-
FDA authorizes use of unapproved Ebola virus test
As Ebola continues to spread throughout West Africa, the Food and Drug Administration(FDA) has authorized the use of an unapproved Ebola virus test developed by the Department of Defensefor use in individuals, including U.S. military personnel and responders, who may be at risk of infection because of their work with individuals who might have the virus.The Test-tube diagnostic test is one of the Pentagon’s investment in developing a vaccine or cure for Ebola.
-
-
Philadelphia refines area 911 call locator technology
In the Philadelphia area and around much of the country, emergency services and first responders are looking to retool the ways in which cell phone locator technology could allow them to aid individuals, and they are calling for the further cooperation of cell phone providers and the government alike. “If you don’t know where the guy is, you can’t help him,” said Edwin Truitt, the Delaware County [Pennsylvania] Emergency Services director.
-
-
Ebola outbreak could inspire African terrorist groups to weaponize the virus: Experts
Recent discussions about Ebola have mainly focused on the disease as a public health hazard, but counterterrorism officials are concerned that the new outbreak could inspire terror groups, specifically those based in West Africa, to weaponize the virus. The fear of weaponized Ebola dates back decades to when the Soviet Union’s VECTOR program, aimed at researching biotechnology and virology, was thought to have researched the creation of Ebola for warfare. In 1992 a Japanese cult group called Aum Shinrikyo tried, but failed, to collect samples of the Ebola virus in Zaire.
-
-
Luminex’s diagnostics tool used in Africa to help control Ebola outbreak
Luminex said the U.S. Army Medical Research Institute of Infectious Diseases (USAMRIID) Diagnostics Division is working on rapid diagnostics for the Ebola virus using Luminex xMAP Technology. Luminex’s MAGPIX system was recently deployed to Africa to support research efforts to control the current outbreak.
-
More headlines
The long view
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.
Trying to “Bring Back” Manufacturing Jobs Is a Fool’s Errand
Advocates of recent populist policies like to focus on the supposed demise of manufacturing that occurred after the 1970s, but that focus is misleading. The populists’ bleak economic narrative ignores the truth that the service sector has always been a major driver of America’s success, for decades, even more so than manufacturing. Trying to “bring back” manufacturing jobs, through harmful tariffs or other industrial policies, is destined to end badly for Americans. It makes about as much sense as trying to “bring back” all those farm jobs we had before the 1870s.
The Potential Impact of Seabed Mining on Critical Mineral Supply Chains and Global Geopolitics
The potential emergence of a seabed mining industry has important ramifications for the diversification of critical mineral supply chains, revenues for developing nations with substantial terrestrial mining sectors, and global geopolitics.