-
NIST awards $9 million to promote online security and privacy
The National Institute of Standards and Technology (NIST) last month announced more than $9 million in grant awards to support the National Strategy for Trusted Identities in Cyberspace (NSTIC); five U.S. organizations will pilot identity solutions which increase confidence in online transactions, prevent identity theft, and provide individuals with more control over how they share their personal information
-
-
New solution helps thwart “smash-and-grab” credential theft
Of the data breaches investigated in 2011, servers were among the primary target assets in 64 percent of investigations and those accounted for 94 percent of compromised records; a new solution from RSA scrambles, randomizes, and splits authentication credentials across multiple servers, data centers, and the cloud
-
-
Washington National Guard keeps an eye on cyberattacks
The Washington National Guard is working on a project that will protect state and local governments as well as utilities and businesses in the state from cyberattacks
-
-
Congressional panel says two Chinese telecom companies pose “national security threat” to U.S.
A report by the House Intelligence Committee recommended that the U.S. government be barred from doing business with two Chinese telecommunications firms – Huawei and ZTE – and that American companies should avoid buying their equipment; a committee report said the two companies pose a threat to U.S. national security; installing these companies’ technology in U.S. communication network will not only allow these companies, acting on behalf of the Chinese military and intelligence, to steal sensitive national security information and trade secrets of private U.S. companies – it will also allow China to attack and paralyze large portions of U.S. critical infrastructure
-
-
The administration set to issue a cybersecurity executive order
President Obama issued a proclamation the other day making October National Cyber Security Awareness month. The administration’s efforts to push a cybersecurity bill through Congress, however, have so far failed, so the administration is opting for a solution other administrations have adopted in the face of a recalcitrant Congress: executive order
-
-
Self-contained, Android-based network to study cyber disruptions, help secure hand-held devices
Researchers linked together 300,000 virtual hand-held computing devices running the Android operating system so they can study large networks of smartphones and find ways to make them more reliable and secure; the work is expected to result in a software tool that will allow others in the cyber research community to model similar environments and study the behaviors of smartphone networks
-
-
Former DHS official says U.S. should go on cybersecurity offensive
Stewart Baker, the first assistant secretary for policy at DHS under President George W. Bush, has a straightforward theory when it comes to cyber security in the United States: “To prevail in the cybersecurity war, defense is not enough”; not all cuber experts agree with him
-
-
Experts warn of growing cyber security risks to U.S., criticize Congress’s inaction
U.S.and Russian cyber experts are trying to scare officials into improving cybersecurity protection in the United Statesand around the world; cyber attacks against critical infrastructure escalate in scope and severity; soon, Kaspersky Lab’s Eugene Kaspersky said: “If previous viruses were like bicycles,then the Stuxnet worm that damaged uranium enrichment centrifuges at the Natanz plant in Iran two years ago would be a plane and the latest programs, dubbed Flame and Gauss,would be space shuttles”
-
-
Pentagon says privately owned computer networks vulnerable to attack
Deputy U.S. Defense Secretary Ashton Carter told hundreds of industry executives and military officials at a conference that he is concerned with the potential of a cyber attack on privately owned U.S. computer networks; “I hope this isn’t one of those situations where we won’t do what we need to do until we get slammed,” Carter said
-
-
DARPA solicits proposals for offensive cyberwar technologies
DARPA, the Pentagon’s research outfit, announced that next month it will host a meeting for defense contractors in which the agency will outline the Pentagon’s need for “revolutionary technologies for understanding, planning and managing cyberwarfare”; the announcement is the latest indication of the greater willingness of military planners and policy makers to discuss U.S. offensive cyberwar capabilities and plans openly
-
-
New FERC office to focus on cyber security
The Federal Energy Regulatory Commission (FERC) has created a new FERC office — Office of Energy Infrastructure Security (OEIS) — which will help the Commission focus on potential cyber and physical security risks to energy facilities under its jurisdiction
-
-
German police wants to develop its own computer surveillance software
The Federal Police Office of Germany (also known as the BKA) is looking to hire software engineers who can develop computer surveillance technology for use by law enforcement and intelligence agencies in criminal investigations
-
-
New NIST publication provides guidance for computer security risk assessments
The National Institute of Standards and Technology (NIST) has released a final version of its risk assessment guidelines which can provide senior leaders and executives with the information they need to understand and make decisions about their organization’s current information security risks and information technology infrastructures
-
-
Boeing to pursue cybersecurity opportunities in Japan
Boeing and Japanese trading company Sojitz are teaming up to offer advanced cybersecurity solutions in Japan to help protect critical government, civil, and commercial information technology infrastructure
-
-
U.K.’s first research institute to investigate the science of cyber security
A new U.K. academic research institute, aiming to improve understanding of the science behind the growing cybersecurity threat, was announced last week; GCHQ, the U.K. intelligence agency, says that the institute, which is funded by a £3.8 million grant, is part of a cross-government commitment to increasing the U.K. academic capability in all fields of cybersecurity
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.