-
Criticism notwithstanding, FCC stands pat on 700 MHz auction rules
FCC stands on open-access and build-out requirements for 24 Jaunary 700 MHz auction; auction will require the winner to build a national network to public safety specifications
-
-
A first: Quantum cryptography secures ballots in Swiss election
Quantum cryptograhpy finds real-world application in guaranteeing integrity of 21 October ballot in the canton of Geneva
-
-
SCADA protection should remain in private hands
Critics say that DHS’s plan to join with NSA to take the lead in protecting SCADA not only raises privacy concerns, but would be ineffective
-
-
Security experts warn of race to the bottom on PCI certs
Did you know that an organization has no legal responsibility to fix a vulnerability? Current laws stipulate the requirement that people be informed when data is breached, but there is nothing forcing a company to fix something before it leads to data being compromised
-
-
DHS publishes list of knowledge, skills required to thwart cyberattacks
DHS works with Defense Department, academia, and private industry to examine workforce IT certifications and what would be needed to advance security skills
-
-
Quantum communication nearer as entanglement swapping realized
Security and computing experts cannot wait for quantum communcation to be mastered; good thing, then, that Swiss researchers show, for the first time, photon pairs entanglement swapping
-
-
Questions over Bain-Huawei's acquisition of 3Com
The $2.2 billion bid answers some questions, i.e., Huawei will not re-enter the market for enterprise switching network gear on its own; many other question are yet to be answered
-
-
Certification program for converged security
Institute launches certification program, and offers some unsettling numbers of threat prevalance in the U.S.
-
-
U.K. data decryption law takes effect
As of Monday, a controversial new British law allows authorities to demand that individuals and businesses to decrypt data sought in police investigations
-
-
Kerberos Consortium launched
MIT launches consortium to promote a universal authentication platform to protect the world’s computer networks
-
-
October is national cybersecurity month
A consortium of government agencies and private industry sponsors have designated October 2007 as National Cyber Security Awareness Month
-
-
PDF files put Windows XP at risk
Cybersecurity researcher says vulnerabilities in popular Adobe file format allows hackers to seize control of computers; Adobe, Symantec work on solution
-
-
FBI investigates Unisys's responsibility for DHS security breaches
Chinese cyber-attackers compromised DHS computers during the summer and fall of 2006; these computers were supposed to be secured by Unisys in 2002 $1 billion contract; FBI investigates breaches and alleged cover-up
-
-
EU plan to block access to bomb-making Web sites faces technical hurdles
The EU wants to make it more difficult for would-be terrorists to gain knowledge on bomb-making, but blocking access to Web sites where such knowledge is offered is not easy
-
-
Network security to move toward "complete packet inspection"
The new approach will embed security in a pervasive manner throughout the entire network to provide the situational awareness necessary to respond instantly to threats or problems and contain the damage before it spreads into the entire network
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.