• New Tool Helps Spot False Information on Social Media

    University of Nebraska students have developed a tool — Info Window – which aims to help audiences look at their social feeds more critically, learn how to spot false information online, and understand how these tools can be used for malicious purposes.

  • The FBI Is Breaking into Corporate Computers to Remove Malicious Code – Smart Cyber Defense or Government Overreach?

    The FBI has the authority right now to access privately owned computers without their owners’ knowledge or consent, and to delete software. It’s part of a government effort to contain the continuing attacks on corporate networks running Microsoft Exchange software, and it’s an unprecedented intrusion that’s raising legal questions about just how far the government can go.

  • Specific Cybersecurity Guidelines to Help Protect Our Elections

    Making elections secure means protecting against ever-evolving threats to information technology — which scans in-person and mail-in ballots, supports voter registration databases and communicates vote tallies. To reduce the risk of cyberattacks on election systems, NIST has released draft guidelines that provide a road map to help local election officials prepare for and respond to cyber threats that could affect elections. The plain-language guide provides strategies to guard election-related technology against cyberattack.

  • UWF Re-Designated as Cybersecurity Regional Hub for the Southeast U.S., with Expanded Mission

    The University of West Florida has been re-designated by the National Security Agency and Department of Homeland Security as the Southeast Centers of Academic Excellence in Cybersecurity (CAE-C) Regional Hub. The UWF Center for Cybersecurity has served as the Southeast regional hub since 2017, providing leadership in cybersecurity education among colleges and universities in five states and Puerto Rico.

  • U.S. Trying to Insulate Electrical Grid from Cyberattacks

    With America’s electrical infrastructure getting zapped daily by an unprecedented number of cyberattacks, the federal government is taking action to prevent a potentially crippling hack of the grid. A 100-day plan was announced Tuesday by the U.S. Energy Department to harden security systems for the country’s electrical infrastructure and increase the ability to detect and neutralize cyber threats.

  • DHS S&T Launches Hacking for Homeland Security Program

    DHS S&T is launching Hacking for Homeland Security(H4HS)  to provide DHS with the capability to drive innovative solutions and identify future interns with applied knowledge to work on DHS mission-relevant topics.H4HSis modeled on Hacking for Defense (H4D). The national academic course is taught at 54 universities and represents a new platform for national service, teaching teams of university students how to use modern entrepreneurial tools and techniques to solve critical national security and intelligence community problems at start-up speed.

  • NSA Awards $6 Million for Cybersecurity Workforce Development

    The Purdue University Northwest (PNW) College of Technology has been awarded a grant of $5,971,053 for Cybersecurity Workforce Development from the National Security Agency (NSA). PNW says that with the funded projects, PNW will be able to contribute significantly to national workforce development in the field of AI and cybersecurity. The U.S. Department of Labor reports that the need for IT and cybersecurity professionals is projected to grow 12 percent from 2018 to 2028 with multi-million shortages.

  • Advancing Applied Research in Cybersecurity

    The Forge Institute, along with the University of Arkansas Fayetteville (UA-Fayetteville) and University of Arkansas Little Rock (UA-Little Rock), jointly announced a partnership to advance applied research in areas that support our national defense, including cybersecurity.

  • Machine Learning Algorithm May Be Key to Timely, Inexpensive Cyberdefense

    Zero-day attacks can overwhelm traditional defenses, costing organizations money and resources. A machine learning algorithm may give organizations a powerful and cost-effective tool for defending against attacks on vulnerable computer networks and cyber-infrastructure, often called zero-day attacks, according to researchers.

  • Creating a National Network of Cybersecurity Institutes

    DHS S&T, in partnership with the Cybersecurity and Infrastructure Security Agency (CISA), awarded $2 million to the University of Illinois at Urbana-Champaign (UIUC) to develop a plan that CISA can execute to build a national network of cybersecurity technical institutes. “CISA sees the growing cybersecurity workforce shortage in the United States as a national security risk,” said Bryan Ware, CISA assistant director of cybersecurity.

  • Legislation Introduced to Ban TikTok from Government Devices

    U.S. Senators Marco Rubio (R-FL), Josh Hawley (R-MO), and Rick Scott (R-FL) have introduced legislation that would ban all federal employees from using TikTok on government devices. The U.S. State Department, the Department of Homeland Security, the Department of Defense, and TSA have already banned TikTok on federal devices due to cybersecurity concerns and the potential for spying by the Chinese government.

  • Macro Cyber Resilience

    The prefixes of ‘macro’ and ‘micro’ have been applied to concepts like economics, or even to activities like photography. They are easy ideas to understand in large versus small scales. However, this term is not usually used to define cyber perspectives, an increasingly important area for security applications.

  • U.S. Expels Russian Diplomats, Imposes New Sanctions on Russia in Retaliation for Hacking, “harmful activities”

    The U.S. has imposed a new round of sanctions against Russia targeting what it calls the “harmful” foreign activities of Moscow. U.S. intelligence officials have pointed the finger at Russia for a massive hack known as SolarWinds that hit large swaths of the U.S. public and private sectors last year. Widely used software is believed to have been infected with malicious code, enabling hackers to access at least nine U.S. agencies, dozens of corporations.

  • Messaging Authoritarianism: China’s Four Messaging Pillars and How ‘Wolf Warrior’ Tactics Undermine Them

    A messaging strategy is only as good as the goal it serves; as Xi Jinping has made clear, China is seeking to make the world safer for its brand of authoritarianism by reshaping the world order. An analysis of messaging from China’s diplomats, state-backed media, and leaders of the Chinese Communist Party (CCP) demonstrates that Beijing repeatedly uses narratives, angles, and comparisons that serve to change perceptions about China’s autocracy and the United States’ democracy—to China’s advantage.

  • After the Islamic State: Social Media and Armed Groups

    The Islamic State is often credited with pioneering the use of social media in conflict, having created a global brand that drew between 20,000 and 40,000 volunteers from at least 85 countries. Social media served as a key recruiting tool, source of fundraising, and platform for disseminating graphic propaganda to a global audience. Laura Courchesne and Brian McQuinn write that the Islamic State perfected tactics and strategies already widely used by hundreds of other armed groups.