-
New communication system to help protect soldiers in the field
The new technology will use arrays of highly specialized antennas that could be worn by combat troops to provide covert short-range person-to-person battleground communications; the technology will lead to advanced wireless systems that would enable small squads of soldiers to share real-time video, covert surveillance data and tactical information with each other via helmet-mounted visors
-
-
CSC wins DHS IT infrastructure and cyber security task order
CSC won a contract to provide information technology infrastructure and cyber support to the National Protection and Programs Directorate’s Office of Cyber Security and Communications; among other things, the company will design and build an expanded watch floor that will integrate national security capabilities from the U.S. Computer Emergency Response Team (US CERT) and the National Coordinating Center of the National Communications System
-
-
Growth trends in software security favor Beyond Encryption
Irish company specializing in developing software for protecting sensitive data stands to benefit from growth trends in the global security software market; most encryption products rely on the user having to remember a password to unlock their data; the approach of Beyond Encryption is to have access controlled by an administrator so that the data is protected wherever it goes
-
-
Day of quantum communications in the theater nears
The challenges so far with free space optical links, which use fibre optics for transmission, have been the turbulence or distortions from temperature differences that cause motion or wind in the atmosphere; researchers have established an optical link without distortion in test situations at a distance of 35km in stationary and flight situations
-
-
Counterfeit chips may hobble advanced weapons
While most computer security efforts have until now been focused on software, tampering with hardware circuitry may ultimately be an equally dangerous threat; the Pentagon now manufactures in secure facilities run by American companies only about 2 percent of the more than $3.5 billion of integrated circuits bought annually for use in military gear
-
-
H1N1-induced work-from-home may clog Internet
Telecommuting is a good idea — up to a point; if, as a result of a pandemic, too many people decide to work from home, this could threaten to overwhelm the Internet, rendering it useless as a way for communicating and conducting transactions vital to public safety and the economy
-
-
The brief
Vetting a chip with a hidden agenda is not easy, and chip makers cannot afford to test every chip; also, today only Intel and a few other companies still design and manufacture all their own chips in their own fabrication plants; other chip designers — including LSI Corp. and, most recently, Sony — have gone “fabless,” outsourcing their manufacturing to off-shore facilities known as foundries
-
-
US CERT: BlackBerry app may be spying on you
A new BlackBerry application has the ability to turn their smartphone into a surveillance tool
-
-
-
DHS to boost cybersecurity spending in 2010
Of the $43 billion DHS 2010 budget, about $397 million is aimed at addressing cybersecurity issues; the amount is $84 million, or about 27 percent, higher than the $313 million that was allocated for information security spending in 2009
-
-
Vulnerability identified in Amazon's cloud computing
Researchers show that it is possible to find would-be victims within cloud hardware; cloud technologies use virtual machines — remote versions of traditional onsite computer systems; the number of these virtual machines can be expanded or contracted on the fly to meet demand, creating tremendous efficiencies — but the actual computing is performed within one or more physical data centers, creating troubling vulnerabilities
-
-
How credible -- and serious -- is the cyber threat the U.S. faces?
New report examines recent cyber attacks on South Korea and asks whether whether the attacks constituted an act of war and whether they could have been the work of a terrorist group; the answer is no on both counts; the U.S. dependence on digital technology makes it somewhat more vulnerable to cyber attacks than other nations,
-
-
The brief
General IT spending by the U.S. government will increase by 3.5 percent a year between 2009 and 2014; during the same time, U.S. government spending on cybersecurity will grow at a compound rate of 8.1 percent a year, and spending on vendor-supplied information security products and services will increase from $7.9 billion in 2009 to $11.7 billion
-
-
Raytheon buys BBN for $350 million
The latest example of traditional defense contractors expanding into the information systems sector is Raytheon’s acquisition of Massachusetts-based BBN, the company which put the “@” in e-mail addresses
-
-
NSA to build $1.5 billion cybersecurity center near Salt Lake City
Facility will support Comprehensive National Cybersecurity Initiative; one goal of the new center will be to help federal agencies reduce government exposure to Internet-based threats by reducing and consolidating the number of external Internet connections across government
-
More headlines
The long view
Researchers Develop AI Agent That Solves Cybersecurity Challenges Autonomously
New framework called EnIGMA demonstrates improved performance in automated vulnerability detection using interactive tools.