-
Trend: Businesses increasingly rely on SAS for security
More and more companies have gravitated toward the idea of “software as a service” (SAS) — using software that is delivered remotely instead of hosted on in-house servers; more and more companies are now offering security products as services — but is it the best approach to security?
-
-
Raytheon wins $155 million wireless contract
DARPA awards Raytheon $155 million to provide a military wireless network interoperable gateway
-
-
New distance record for quantum encryption
Quantum encryption (or quantum key distribution [QKD]) holds the promise of unbreakable communication encryption; the technology has a weakness, though: the short distance of key distribution; researchers break distribution distance record by distributing keys over a distance of 250 kilometers (it may not look like much, but back in 1992 the record was 32 centimeters)
-
-
Houston computer forensics lab accredited
Newly accredited Houston lab expands Regional Computer Forensics Laboratory Network (RCFL), a national network of sixteen FBI-sponsored digital forensics laboratories and training centers devoted entirely to the scientific examination of digital evidence in support of criminal investigations
-
-
GSA adds more cybersecurity software to SmartBuy program
GSA estimates the contracts could be worth $20 million over five years
-
-
Congress wants FCC cyber security updates
FCC among a list of eleven agencies which may have been affected by a 4 July service attack
-
-
Glass fibers can make a building sturdier
Conventional means to reinforce concrete involve the use of steel bars; the use of fiber reinforced polymer (FRP) is emerging as a valuable option, owing to its natural resistance to corrosion, its high strength, light weight, transparency to electrical and magnetic fields and ease of manufacturing and installment
-
-
U.S. secret service forms three new task forces
New task forces will deal with electronic crimes, and the agency says the partnerships will bring together law enforcement, academia, and private sector
-
-
Cyber crime bigwigs using big-business tactics
Cisco cybercrime reports says “The novel thing is that [cybercriminals] have taken the Harvard Business School, General Electric board room business training and applied it to their old techniques”
-
-
SAIC acquires Atlan
Large federal contractor acquires McLean, Virginia-based Atlan, a specialist in cybersecurity product testing and certification of FIPS 140-2 and 201 for product vendors
-
-
Competition between Symantec, McAfee intensifies
With growing consumer awareness of cybersecurity threats, the competition between the two leading cybersecurity companies intensifies; McAfee has been lagging, but new leadership and willingness to take risks have improved its market position
-
-
Practical guides to disaster recovery planning in SMEs
Gartner says that “40% of all SMBs will go out of business if they cannot get to their data in the first 24 hours after a crisis”; two papers aim to help SMBs prepare for disaster
-
-
South Korea says cyber attackers used IP address in 16 nations
South Korea’s intelligence agency — the NIS — said that the 4-8 July attacks on U.S. and South Korean Web sites and networks used 86 IP addresses in 16 countries; the NIS also briefed South Koran lawmakers on circumstantial and technical reasons for believing that North Korea could be behind the attacks
-
-
Experts differ on seriousness, and source, of attacks on U.S. Web sites
Between Monday and Wednesday, public and private computers in the U.S.— among them the White House, the New York Stock Exchange, and the Washington Post — were targeted for a broad and sustained attack; some of these computers were taken down for a while; experts disagree on the seriousness of the attack — or its source
-
-
Number of U.K. data breach incidents on the rise
Security breaches in the U.K.— in both the private and public sectors — are on the rise; one third of firms unaffected by data loss incident had introduced an enterprise-wide encryption policy
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.