-
NIST in new password management policy
NIST offers, and opens for public comment, new password policy for government and private organizations
-
-
U.K. government drops central database scheme
Burden of storing communication logs will now fall to ISPs
-
-
A lost or stolen laptop costs companies nearly $50,000
A company may pay $1,000-$2,000 for a laptop computer for one of its employees; if the employee lost the laptop or it was stolen, the cost to the employer would average $49,246
-
-
U.K. considering joining EU cyberwar effort
U.K. government says it is considering taking part in the EU equivalent of the U.S. Cyber Storm drill, but is worried not all EU members are ready
-
-
Hathaway: cybersecurity must be joint effort
President Obama’s top cybersecurity adviser: The fragility of the world’s digital infrastructure is “one of the most serious economic and national security challenges of the 21st century”
-
-
F-35 project hacking case highlights need for tighter contractor security
Hackers managed to download terabytes of information about one of the Pentagon’s most prized weapons systems; experts say this latest breach highlights the need for stricter security requirements for contractor networks
-
-
Hackers steal several terabytes of data on U.S. fighter-jet project
Hackers — in all likelihood Chinese operatives — breach Pentagon’s security and download several terabytes of data on the $300-billion Joint Strike Fighter project (the F-35 Lightning II) which may make it easier to defend against the futuristic aircraft
-
-
U.S. looks to hackers to protect cyber networks
DHS is looking for hackers — not to prosecute them, but to pay them to secure the nation’s networks
-
-
South Africa: Intelleca awarded voice biometrics contract
South African leading network operator awards Intelleca large voice recognition contract; the operator plans to implement the solution across a range of business areas in its contact center
-
-
Counterintelligence expert not worried about Chinese hacking
Joel Brenner, national counterintelligence executive, says is less worried about Chinese hacking of U.S. banking system and somewhat more worried about such hacking of U.S. critical infrastructure;
-
-
Harris Corporation acquires Wireless Systems for $675 million in cash
The global land mobile radio (LMR) systems market is values at $9 billion a year and growing; Harris Corporation wants a bigger presence in this emergency and public safety communication market; it is set to acquire Tyco Electronics Wireless Systems, creating a leading provider of wireless communication networks in the LMR systems market
-
-
The security of the U.S. communications network, II
A few vandals, equipped with pliers, last Thursday cut fiber-optics cables in the San Francisco Bay area, paralyzing wireless, Internet, phone, and emergency communication for more than twelve hours; what does this tell us about the vulnerability to disruption of the .S. communication network?
-
-
NIST offers five encryption tips
There are many encryption algorithms, techniques, and products — and many user devices and threats against them; NIST offers five encryption tips
-
-
The security of the U.S. communications network, I
A few vandals, equipped with pliers, last Thursday cut fiber-optics cables in the San Francisco Bay area, paralyzing wireless, Internet, phone, and emergency communication for more than twelve hours; what does this tell us about the vulnerability to disruption of the U.S. communication network?
-
-
Hackers made off with more than 285 million records in 2008
Hackers managed to steal 285 million private records in 2008; 93 percent of all compromised records in its study came from the financial sector
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.