-
3rd Annual Critical Infrastructure Security Summit Announced
Critical Infrastructure consists of the sixteen sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on national and economic security, and on public health and safety. Defense Strategies Institute will hold its 3rd annual Critical Infrastructure Security Summit which will discuss ways to create more resilient systems to protect this infrastructure.
-
-
Extremist NFTs Across Blockchains
While tech companies, politics, and civil society continue to discuss how to regulate social networks, a new age of the internet is dawning: the Web3. Julia Handle and Louis Jarvers write that with the technological advancements of Web3, it is critical to examine their application to extremism.
-
-
Quantum Technology for Mobile Phone Encryption Nears
In a few years, protection of communication with quantum encryption may become a permanent fixture in mobile phones and thus protect communication from hacking. The technology has already been demonstrated in large data transfers in the financial sector.
-
-
How Can Congress Regulate AI? Erect Guardrails, Ensure Accountability and Address Monopolistic Power
A new federal agency to regulate AI sounds helpful but could become unduly influenced by the tech industry — instead, Congress can legislate accountability.Instead of licensing companies to release advanced AI technologies, the government could license auditors and push for companies to set up institutional review boards. The government hasn’t had great success in curbing technology monopolies, but disclosure requirements and data privacy laws could help check corporate power.
-
-
Can Quantum Computing Protect AI from Cyberattacks?
AI algorithms are everywhere. They underpin nearly all autonomous and robotic systems deployed in security applications. This includes facial recognition, biometrics, drones and autonomous vehicles used in combat surveillance and military targeting applications. Can we prevent malicious attacks and improve the cybersecurity of algorithms powered by artificial intelligence (AI)? Quantum machine learning may hold the key.
-
-
AI Model Aims to Plug Key Gap in Cybersecurity Readiness
There are more than 213,800 available known “keys”—unofficial entry points into computer systems, better known as vulnerabilities or bugs—and they’re already in the hands of criminals. There are likely many more that are not known. How can all the threats and attacks be tracked, prioritized and prevented? Scientists link resources to improve prioritization, spot attacks more quickly.
-
-
State-Sponsored Chinese Hackers Targeting U.S., Western Critical Infrastructure: Microsoft
Microsoft says that Chinese government-sponsored hacking group Volt Typhoon has been attacking critical infrastructure targets in the US, Australia, Canada, New Zealand, and UK, and possibly many more countries. The affected targets span various sectors, including communications, manufacturing, utilities, transportation, construction, maritime, government, information technology, and education. The attacks began in mid-2021 and appear to be aimed at undermining the US in the event of a regional conflict.
-
-
Bolstering Cybersecurity in Navigation Systems
Interference such as jamming and spoofing that targets critical infrastructure has the potential to cause widespread delays and cascading failures across multiple modes of transportation including ships, trains, trucks, and cars—and the problem is only getting worse. New project aims to enhance resilience of transportation infrastructure against cyber threats, developing advanced countermeasures for GPS spoofing and jamming.
-
-
New Program Will Harness AI to Bolster Cybersecurity
Researchers will work across disciplines to develop new approaches to artificial intelligence that is informed by and works with security experts. The AI tools developed by the new program will perform security tasks quickly and accurately while anticipating potential moves made by adversaries. The AI will counteract the possible attacks in a way that protects computer network security and ensures people’s safety.
-
-
Bringing Better IT Security on Board
Cyberattacks on industry and critical infrastructure are on the rise across the globe. Targets also include ships, which, by transporting billions of tons of goods around the world each year, form part of international supply chains — yet their on-board IT systems often lack secure protection.
-
-
NIST Updates Guidelines for Protecting Sensitive Information
NIST has updated its draft guidelines for protecting sensitive unclassified information, in an effort to help federal agencies and government contractors more consistently to implement cybersecurity requirements. Draft Revision 3 aligns the publication’s language with NIST’s 800-53 catalog of cybersecurity safeguards.
-
-
Making the Power Grid More Reliable and Resilient
The U.S. power grid comprises nearly 12,000 power plants, 200,000 miles of high-voltage transmission lines, 60,000 substations and 3 million miles of power lines. It may well be the most massive and complex machine ever assembled. Argonne National Labs’ researchers help keep this machine working in the face of daunting challenges.
-
-
Six Pressing Questions We Must Ask About Generative AI
The past twenty-five years have demonstrated that waiting until after harms occur to implement internet safeguards fails to protect users. The emergence of Generative Artificial Intelligence (GAI) lends an unprecedented urgency to these concerns as this technology outpaces what regulations we have in place to keep the internet safe.
-
-
Lessons from ‘Star Trek: Picard’ – a Cybersecurity Expert Explains How a Sci-Fi Series Illuminates Today’s Threats
Sometimes Hollywood gets it right by depicting reality in ways that both entertain and educate. And that’s important, because whether it’s a large company, government or your personal information, we all share many of the same cybersecurity threats and vulnerabilities. As a former cybersecurity industry practitioner and current cybersecurity researcher, I believe the final season of “Star Trek: Picard” is the latest example of entertainment media providing useful lessons about cybersecurity and the nature of the modern world.
-
-
Making Electric Vehicle Charging Stations Cybersecure
As more electric vehicles (EVs) hit the road, charging stations are popping up across the United States. The benefits go beyond curbing carbon emissions from road travel. These systems can also link to the electric grid through smart charging, drawing power when overall demand is low and feeding it back to the grid when needed.
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
By Zachary Roth
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
By Dino Jahic
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
By Trina West
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.