-
China emerges in Asian security solutions market
China now accounts for 22 percent of the total security solutions revenues in Asia/Pacific (excluding Japan); by 2011 it will account for 30 percent
-
-
Criticism notwithstanding, FCC stands pat on 700 MHz auction rules
FCC stands on open-access and build-out requirements for 24 Jaunary 700 MHz auction; auction will require the winner to build a national network to public safety specifications
-
-
A first: Quantum cryptography secures ballots in Swiss election
Quantum cryptograhpy finds real-world application in guaranteeing integrity of 21 October ballot in the canton of Geneva
-
-
SCADA protection should remain in private hands
Critics say that DHS’s plan to join with NSA to take the lead in protecting SCADA not only raises privacy concerns, but would be ineffective
-
-
Security experts warn of race to the bottom on PCI certs
Did you know that an organization has no legal responsibility to fix a vulnerability? Current laws stipulate the requirement that people be informed when data is breached, but there is nothing forcing a company to fix something before it leads to data being compromised
-
-
DHS publishes list of knowledge, skills required to thwart cyberattacks
DHS works with Defense Department, academia, and private industry to examine workforce IT certifications and what would be needed to advance security skills
-
-
Quantum communication nearer as entanglement swapping realized
Security and computing experts cannot wait for quantum communcation to be mastered; good thing, then, that Swiss researchers show, for the first time, photon pairs entanglement swapping
-
-
Questions over Bain-Huawei's acquisition of 3Com
The $2.2 billion bid answers some questions, i.e., Huawei will not re-enter the market for enterprise switching network gear on its own; many other question are yet to be answered
-
-
Certification program for converged security
Institute launches certification program, and offers some unsettling numbers of threat prevalance in the U.S.
-
-
U.K. data decryption law takes effect
As of Monday, a controversial new British law allows authorities to demand that individuals and businesses to decrypt data sought in police investigations
-
-
Kerberos Consortium launched
MIT launches consortium to promote a universal authentication platform to protect the world’s computer networks
-
-
October is national cybersecurity month
A consortium of government agencies and private industry sponsors have designated October 2007 as National Cyber Security Awareness Month
-
-
PDF files put Windows XP at risk
Cybersecurity researcher says vulnerabilities in popular Adobe file format allows hackers to seize control of computers; Adobe, Symantec work on solution
-
-
FBI investigates Unisys's responsibility for DHS security breaches
Chinese cyber-attackers compromised DHS computers during the summer and fall of 2006; these computers were supposed to be secured by Unisys in 2002 $1 billion contract; FBI investigates breaches and alleged cover-up
-
-
EU plan to block access to bomb-making Web sites faces technical hurdles
The EU wants to make it more difficult for would-be terrorists to gain knowledge on bomb-making, but blocking access to Web sites where such knowledge is offered is not easy
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
By John Tucker
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.