-
Ten companies win government DAR contracts
More and more government employees carry more and more laptops; there is a need to secure the data — DAR, for data at rest —on the hard drives of these laptops in case they are lost or stole
-
-
Identity theft victims to be compensated
ChoicePoint compiles and sells personal information, and in 2005 it sold information about many consumers to identity thieves; the FTC-ChoicePoint settlement may be a model for similar cases in the futrue
-
-
New details about AT&T's cooperation with the NSA in domestic spying
Scope of AT&T-NSA collusion in domestic spying on AT&T customers’ Internet traffic revealed in court documents
-
-
NIST issues revised security controls guide
Making sure information systems are secure is a daunting challenge; NIST’s revised — and hefty — guide would help IT managers cope
-
-
Broadcom acquires GPS specialist Global Locate
Broadcom pays $146 million for GPS specialist with a technology that reduces location identification from minutes to seconds
-
-
Online security experts in legal gray area
Laws hampers the ability of online security experts do their job dilligently and effectively — not a good thing when the use of Web-based applications grows by leaps and bounds
-
-
Quantum encryption: Inherently unbreakable or vulnerbale to hacking?
As debate continues about whether or not quantum encryption is inherently unbreakable, a team of researchers was able to create an encryption key in two locations simultaneously, 144 kilometers apart
-
-
Quantum keys sent over 200-km fiber-optic link
If properly executed, quantum encryption is unbreakable because eavesdropping changes the state of the photons
-
-
Air Force assesses cyber vulnerability
The more organizations become dependend on communication networks, the more they must ensure that these networks do not themselves become vulnerable to enemy attacks; this is what the U.S. Air Force is now doing
-
-
GAO says FBI's critical networks vulnerable to misuse
The FBI has made important strides since 2002 in securing its networks; the GAO says that sensitive and critical information transmitted on these networks is still not secure
-
-
Democrats wonder about possible cyberattack on nuclear facilities
Last summer’s shut-down of Brown’s Ferry prompt Thompson and Langevin to request a thorough review
-
-
Estonia accuses Russia of botnet attacks
Former Soviet republic reports that Russian government computers are the source of a wave of botnet attacks; a dispute over a WWII monument heats up
-
-
Verizon signs deal to buy Cybertrust
Agreement is seen a “competitive coup” against the managed security industry; Verizon will also acquire certification firm ICSA Labs
-
-
Democrats wonder about possible cyber attack on nuclear facilities
Last summer’s shut-down of Brown’s Ferry prompt Thompson and Langevin to request a thorough review
-
-
SafeNet to make its IP avaliable on chipestimate.com
Network chip developers will be glad to see that SafeNet will allow centralized access to information about the its silicon IP security solutions at chipestimate.com
-
More headlines
The long view
Social Media’: The Changing Tech of Terror
In the wake of the white noise generated by mainstream social media channels and apps, a new trend of ‘anti-social media’ has emerged in recent years, which seeks to abandon mainstream platforms, reduce screen time, and seek private, intimate, or even ‘analogue’ communication to avoid algorithm-driven polarization, surveillance and loneliness. But some of these so-called anti-social media platforms have also become off-the-wall mediums for disseminating extremist propaganda.
Allfare: China’s Whole-of-Nation Strategy
To analyze how states exert their influence, scholars often compartmentalize actions into rigid analytical frameworks, which obscures the holistic scope of the challenge.
France Strikes to Address Misinformation Weakening Western Alliance
The key destabilizing feature of today’s information environment is no longer simply that democracies are targeted by adversaries’ misinformation and disinformation. Increasingly, the danger is coming from uninhibited partners in the allied ecosystem itself.
