-
Obama to seek sweeping changes for cybersecurity
High administration official says that the administration wants to create “far-reaching incentives” for prioritizing cybersecurity in the private sector, which controls much of the nation’s critical IT infrastructure
-
-
U.K. government: Best cyber defense is cyber offense
New National Security Strategy document includes, for the first time, a public cyber security strategy; unnamed high government source: “We don’t want to engage in cyber war but we can’t remain a target for criminals to take a pop at”
-
-
Licensing cybersecurity professionals, II
Even with all the unanswered questions, some cybersecurity experts are happy just to be having the conversation on the topic; they say that all the focus on cybersecurity will turn more attention on training and certification efforts
-
-
U.S. cybercommand will be subordinated to the NSA
Secretary of Defense Gates announces the creation of the U.S. cybercommand; the organization will be based at Fort Meade outside Washington, D.C. and subordinated to the head of the NSA
-
-
Corporate security chiefs say insiders are greatest threat to data
Survey finds that 80 percent of CSIO are more concerned about employees and contractors than they are about external hackers
-
-
Licensing cybersecurity professionals, I
There is a move in Congress to require the Commerce Department to develop or coordinate and integrate a national licensing, certification, and periodic recertification program for cybersecurity professionals
-
-
Effective cybersecurity requires common language
Experts say that the lack of a common way of defining and speaking about cybersecurity threats, risk, and incidents hampers security efforts
-
-
U.K. government to give up on massive Internet snoop scheme
The Home Office admits that its IMP (Interception Modernization Program) — the cost of which was to be £2 billion over ten years — cannot be realized because the technology does not yet exist
-
-
U.S. cybersecurity chief says there is a lucrative market in malware
Philip Reitinger: “There is an entire community of people who are involved, organized crime is involved” in cybercrime underground market economy
-
-
Cyber attackers strike Johns Hopkins University lab
The Johns Hopkins University Applied Physics Laboratory has been awarded $7.3 million to work on the initial phase of the Obama administration’s cyber security project; the lab has been forced to take down its computers after discovering that hackers broke into the lab’s network
-
-
Web-based news from Iran may contain malware
Many use Twitter to follow the fast-changing news from Iran; security experts warn that criminals may use Twitter to plant malware in your computer
-
-
DHS announces $1.8 billion in federal preparedness grants
Grants to states and localities aim to protect, prevent, respond, and recover from potential calamities this fiscal year
-
-
Hathaway describes administration's cybersecurity response plan
The U.S, infrastructure is being challenged and attacked not by amateurs, but by professional criminals and spies backed with substantial resources; yet, there are no coordinated plans for protecting the critical infrastructure or responding to incidents, either by government or the private sector; the Obama administration plans to change that
-
-
Quantum computing nears with European QAP project
QAP co-coordinator Professor Ian Walmsley: “Quantum computing, when it arrives, could make all current cryptographic technology obsolete”
-
-
China uses stolen software in its new Internet censorship scheme
The Chinese government will impose strict Internet censorship beginning 1 July; the software the Chinese will use for filtering Web sites was stolen from California-based Solid Oak Software; the Chinese piracy was exceedingly clumsy: a file containing a 2004 Solid Oak news bulletin has been accidentally included in the Chinese filtering coding
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.