-
Social network spying may backfire, lead to low returns
Organizations looking to hire new staff should rethink their clandestine use of social networking Web sites, such as Facebook, to screen new recruits. Researchers found that this practice could be seen as a breach of privacy and create a negative impression of the company for potential employees. This spying could even lead to law suits.
-
-
NERC’s critical infrastructure protection standards ambiguous, unclear: analysts
In January 2008, to counter cybersecurity threats to critical infrastructure assets such as bulk electricity supply (BES), North American Electric Reliability Corp.’s (NERC) launched its Critical Infrastructure Protection (CIP) standards for BES cybersecurity. The NERC-CIP is marked by uncertainties and ambiguous language, raising concerns in the industry and among industry observers as companies try to enforce the standards. “Industry now screams for a defined control set with very specific requirements that don’t permit subjective and ambiguous interpretations,” comments one analyst.
-
-
Lawmaker wants to know how cyber-safe vehicles are
Senator Ed Markey (D-Massachusetts) has asked twenty automobile manufacturers to submit details of their plans to prevent vehicles from wireless hacking attempts, as well as plans to prevent violations of driver privacy. Markey wants automobile manufacturers to apply computer-industry security processes and technology — including anti-virus software, incident logging, incident-response planning, software vulnerability patching, and third-party penetrating testing — to mass produced vehicles.
-
-
Cybersecurity giants adapt to changing cyberthreat landscape
McAfee and Symantec, the two technology giants of traditional firewall and antivirus protection software, are shifting their attention to focus more on cybersecurity challenges. A rapidly changing landscape for computer networks, in which data is transmitted and stored via mobile devices and cloud computing, has created demand for products and services that can secure information against state-sponsored or organized cyber terrorism.
-
-
Cold War to cyber war, here’s how weapon exports are controlled
It was reported last week that the U.K. government is pushing for new restrictions on software — in particular, on tools that would prevent surveillance by the state. This was the focus of negotiations to incorporate cyber security technologies into the Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies. Wassenaar was born of the Cold War in 1996. The idea was to inhibit the Soviets (and Chinese) by preventing the export of military equipment and the technology that could be used to make, maintain or defeat that equipment. The push to include cybersecurity in Wassenaar negotiations is unlikely to be effective but will reassure nervous politicians and officials.
-
-
Shot spotting system helps Stockton, Calif. Police reduce gunfire
ShotSpotter sensors detect gunfire, then immediately transmit a signal to control center where technicians use triangulation to locate the spot of origin of the firing to within five to ten feet. The technician reports the location within thirty to forty seconds to the police to dispatch officers to the scene. Stockton, California police has been using ShotSpotter for nine months now, and the police chief says the system has helped reduce gunfire in the covered area by fifty percent.
-
-
U.S. loses clean electricity as nuclear power plants keep closing
Four nuclear power plants, sources of low-emissions electricity, have announced closings this year. The main reason: the increasing availability of cheap natural gas as a result of fracking. If plants continue to shut down instead of extending operations, the United States risks losing 60 percent of its clean electricity starting in 2030, according to a new report by the American Physical Society (APS). The APS calls on socially responsible investors to encourage utilities to consider carbon emissions in business decisions.
-
-
Food security and self-provision of major cities
Wealthy capital cities vary greatly in their dependence on the global food market. The Australian capital Canberra produces the majority of its most common food in its regional hinterland, while Tokyo primarily ensures its food security through import. The Copenhagen hinterland produces less than half of the consumption of the most common foods. For the first time, researchers have mapped the food systems of capital cities, an essential insight for future food security if population growth, climate change, and political instability will affect the open market.
-
-
Effectively modeling and profitably insuring terrorism risk
The insurance industry continues to explore ways to insure against terrorism risk, finding it a challenge despite developing various methodologies to measuring the likelihood of a terrorist attack. Terrorism experts in the insurance industry insist that because terrorism risk can be modeled, it can be effectively priced, and they note that several insurance companies are effectively modeling and profitably insuring terrorism risk today.
-
-
Cybersecurity isn’t all about doom and gloom
Much is made in the press of the devastating effects that weak cybersecurity is having on the economy in the United Kingdom and globally. The threat is compounded by a significant skills shortage. The U.K. government thinks the problem is so severe that it has identified cybersecurity as a Tier 1 national security threat and invested 860 million pounds to defend the country’s digital shores. What all this means is that there is money to be made from cybersecurity and small businesses should not fear it but embrace it. The business opportunities are boundless in cybersecurity. One area that is promising in this sense is the move towards smart cities. As the infrastructure around us, such as traffic lights and utilities becomes more regularly controlled via computers, market opportunities emerge
-
-
New Silicon Valley focus on cybersecurity
The last time Silicon Valley focused on cybersecurity was in the 1990s. That focus saw the emergence of two giants: McAfee and Symantec. The two companies remain the most recognizable household names, thanks to their traditional firewall and anti-virus products. Now they find the arena which they thought was their own encroached from two sides. On one side there are tech giants like Hewlett-Packard and Cisco Systems, which see new revenue opportunity in cybersecurity. On the other side there is a rush of start-ups backed by large investments of venture capital.
-
-
Cyberweapons to defend electricity's perimeter
Cyber war, cyber terror, and cyber crime target all manner of operations and, by design, cannot be detected until they have already done their damage. Nobody is immune to such attacks, and particularly target-rich environments include government bodies and critical power industries such as bulk electricity supply (BES). Hackers and cyberdefenders clash just outside of, at, or inside an organization’s electronic security perimeter (ESP). To counter such threats, a bulk electricity solution — North American Electric Reliability Corp.’s (NERC) Critical Infrastructure Protection (CIP) standards regarding BES cybersecurity — was launched in January 2008 through Federal Energy Regulatory Commission (FERC) oversight. How effective is the use of cyberweapons in protecting electricity’s perimeter?
-
-
Protecting cars from hackers
A U.S. senator has asked twenty automobile manufacturers how each plans to stave off wireless hacking attempts on the computer systems of the vehicle they manufacture, and also how they protect driver privacy. The questions by Senator Ed Markey (D-Massachusetts) indicate that he will demand that carmakers apply computer-industry security processes, including implementation of anti-virus software, incident logging, incident-response planning, software vulnerability patching, and third-party penetration testing — the last of which would stage real hacker attacks on mass-production vehicles.
-
-
NIST's cybersecurity framework for infrastructure
Company which are managing critical infrastructure in the United States and disregard the Preliminary Cybersecurity Framework, issued by the National Institute of Standards and Technology (NIST) in late October, do so at their own peril. The framework is now in its final comment stage and due to be released in mid-February. It lays out a set of comprehensive but voluntary cybersecurity practices.
-
-
Federal IT spending to exceed $11 billion by 2018
A new report from Delteks, contracted spending on cybersecurity will continue to grow from nearly $9 billion in FY2013 to $11.4 billion in FY2018, driven by multiple initiatives aimed at improving the overall cybersecurity posture of federal agencies. Persistent threats, complex and evolving policy issues, and changing technologies highlight ongoing cyber-workforce shortages to drive investments despite constrained federal IT funding.
-
More headlines
The long view
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.
Trying to “Bring Back” Manufacturing Jobs Is a Fool’s Errand
Advocates of recent populist policies like to focus on the supposed demise of manufacturing that occurred after the 1970s, but that focus is misleading. The populists’ bleak economic narrative ignores the truth that the service sector has always been a major driver of America’s success, for decades, even more so than manufacturing. Trying to “bring back” manufacturing jobs, through harmful tariffs or other industrial policies, is destined to end badly for Americans. It makes about as much sense as trying to “bring back” all those farm jobs we had before the 1870s.
The Potential Impact of Seabed Mining on Critical Mineral Supply Chains and Global Geopolitics
The potential emergence of a seabed mining industry has important ramifications for the diversification of critical mineral supply chains, revenues for developing nations with substantial terrestrial mining sectors, and global geopolitics.