• Improving security monitoring of energy industry networked control systems

    There are a number of useful products on the market for monitoring enterprise networks for possible security events, but they tend to be imperfect fits for the unusual requirements of control system networks. A network monitoring solution that is tailored to the needs of control systems would reduce security blind spots. The National Cybersecurity Center of Excellence (NCCoE) is seeking collaborators on an effort to help energy companies improve the security of the networked technologies they rely upon to control the generation, transmission and distribution of power.

  • DHS to rely on big data to protect critical infrastructure, networks

    DHS officials responsible for protecting federal civilian networks and critical industries from cyberattacks are going to rely more on big data analytics to predict, detect, and respond to future hacks, according to a White House progress reportreleased on 5 February. The report details how cybersecurity officials are “working across government and the private sector to identify and leverage the opportunities big data analytics presents to strengthen cybersecurity.”

  • CEO responsibilities for data breach

    The job of a chief executive officer (CEO) is becoming more difficult every year. Today, in addition to being strategic visionaries and leaders, most CEOs must deal with complex legal issues surrounding their organizations. More often they are being held personally responsible for mistakes made by their organizations. Security breaches are one of the fastest growing legal issues facing many C-level executives. All C-level executives need to be prepared to handle a potential security crisis with the help of IT, legal, and PR (public relation) teams.Taking rapid countermeasures and openly communicating about breaches are key factors in effectively managing expectations of a company’s shareholders and customers.

  • Spotting, neutralizing hackers when they are already inside your systems

    Since the Internet gained popularity in the 1990s, the traditional model of cybersecurity has been to build systems and software which could keep hackers out of computers. As hackers continue to tap into complex security systems, however, some cybersecurity experts are advising companies to focus on tricking or neutralizing hackers once they have infiltrated networks, rather than spending money only on trying to keep them out.

  • Army Reserves, six universities establish cybersecurity training centers for cyber warriors

    The U.S. Army Reserves (USAR) Cyber Public Private Partnership Initiative (Cyber P3) sees the USAR partner with six universities to establish six centers of cybersecurity training for USAR. Each school in the Cyber P3 will be able to give reservists the training necessary to receive advanced foundational cyber skills and the potential equivalency for cyber Military Occupational Specialty Qualification, which would enable them to become specialists in the Army. They will also have the opportunity to enroll at the schools with scholarships provided through the program and the G.I. Bill. 

  • Cybersecurity sector welcomes Obama’s $14 billion cybersecurity initiatives in 2016 budget

    Massachusetts cybersecurity firms applauded President Barack Obama proposed$14 billion toward cybersecurity initiatives in his 2016 budget. If approved, the federal government would spend more money on intrusion detection and prevention capabilities, as well as cyber offensive measures. Waltham-based defense contractor Raytheon, whose government clients already use the firm for its cybersecurity capabilities and expertise, believes the cybersecurity industry is expected to grow even faster in the coming years.

  • Obama continues push for cybersecurity bill

    Following his remarks on cybersecurity at the 2015 State of the Union address, President Barack Obama will attenda summit on Cybersecurity and Consumer Protectionat Stanford Universitythis Friday. Attendees will include major stakeholders in cybersecurity and consumer financial protection issues, including executives from the financial services, telecommunications, and retail industries, as well as law enforcement officials and consumer advocates. Obama has requested $14 billion for cybersecurity initiatives in the 2016 federal budget, a 10 percent increase from 2015 budget.

  • Growing demand for cyber insurance, especially by small and mid-size businesses

    Technology startup firms are leading the way in ensuring not only the security of their customers, but their own security as well. American businesses are expected to pay $2 billion for cyber insurance premiums in 2014, a 67 percent increase from just one year earlier. More than fifty U.S. insurance carriers are now offering cyber insurance policies. Even more impressively, many of these are focusing on small and mid-size businesses.

  • Emergence of the Internet of Things significantly weakens privacy protection

    Researchers are urging consumers to take a proactive approach to ensure Internet privacy, particularly with companies that use and share Internet data to influence consumer behavior. They warn that privacy “approaches that rely exclusively on informing or ‘empowering’ the individual are unlikely to provide adequate protection against the risks posed by recent information technologies.”Those emerging risks include information compiled by Internet-connected appliances, cars, and health monitors.

  • Protecting the security for networks of the future

    Today’s company networks comprise hundreds of devices: routers for directing data packets to the right receiver, firewall components for protecting internal networks from the outside world, and network switches. Such networks are extremely inflexible because every component, every router and every switch can carry out only the task it was manufactured for. If the network has to be expanded, the company has to integrate new routers, firewalls or switches and then program them by hand. This is why experts worldwide have been working on flexible networks of the future for the last five years or so, developing what is known as software-defined networking (SDN). It presents one disadvantage, however; it is susceptible to hacker attacks. Researchers have now developed a way to protect these future networks.

  • The encryption debate is heating up

    The privacy vs. security debate is heating up. Should messages on private devices be encrypted to protect our privacy? Will this dangerously hamper national and international security efforts? If we go the encryption route, are technologies being implemented fast enough to protect sensitive data from criminals?

  • Privacy in the digital age essential to protecting basic liberties: Privacy law expert

    In our increasingly digital world, the balance between privacy and free speech is tenuous, at best. We often overlook, however, the important ways in which privacy is necessary to protect our cherished civil liberties of freedom of speech, thought, and belief, says Neil M. Richards, JD, a privacy law expert at Washington University in St. Louis and author of the new book, Intellectual Privacy: Rethinking Civil Liberties in the Digital Age, published 2 February.

  • U.S. yet to develop a strategy to secure nation’s critical infrastructure

    For years, the U.S. government has warned federal and state agencies about the threat posed by hackers who may target computer systems responsible for operating nuclear plants, electric substations, oil and gas pipelines, transit systems, chemical facilities, and drinking water facilities. In February 2013, President Barack Obama issued a directive stating, “It is the policy of the United States to strengthen the security and resilience of its critical infrastructure against both physical and cyber threats.” Two years later the federal government has yet to develop or adopt a consensus on how to secure America’s critical infrastructure from cyber criminals.

  • Assad regime employed Skype to steal military plans from moderate rebels

    A FireEye report details the activities of a cyber-espionage group that stole Syrian opposition’s strategies and battle plans. To undertake this operation, the threat group employed a familiar tactic: ensnaring its victims through conversations with seemingly sympathetic and attractive women. As the conversations progressed, the “women” would offer up a personal photo, laden with malware and developed to infiltrate the target’s computer or Android phone.

  • New Chinese cyber rules aim to facilitate intellectual property theft: U.S. tech companies

    The Chinese government’s cyberspace policy group in late 2014 approved a 22-page document which contained strict procurement rules for technology vendors. Those rules would require U.S. firms selling computer equipment in China to turn over sensitive intellectual property — including source codes — submit their products for “intrusive security testing,” and use Chinese encryption algorithms. U.S. companies selling equipment to Chinese banks will be required to set up research and development centers in China, get permits for workers servicing technology equipment, and build “ports” which allow Chinese officials to manage and monitor data processed by their hardware. U.S. tech companies charge that the new rules would make it easier for China to steal U.S. companies’ intellectual property.