• U.S. Trying to Insulate Electrical Grid from Cyberattacks

    With America’s electrical infrastructure getting zapped daily by an unprecedented number of cyberattacks, the federal government is taking action to prevent a potentially crippling hack of the grid. A 100-day plan was announced Tuesday by the U.S. Energy Department to harden security systems for the country’s electrical infrastructure and increase the ability to detect and neutralize cyber threats.

  • DHS S&T Launches Hacking for Homeland Security Program

    DHS S&T is launching Hacking for Homeland Security(H4HS)  to provide DHS with the capability to drive innovative solutions and identify future interns with applied knowledge to work on DHS mission-relevant topics.H4HSis modeled on Hacking for Defense (H4D). The national academic course is taught at 54 universities and represents a new platform for national service, teaching teams of university students how to use modern entrepreneurial tools and techniques to solve critical national security and intelligence community problems at start-up speed.

  • NSA Awards $6 Million for Cybersecurity Workforce Development

    The Purdue University Northwest (PNW) College of Technology has been awarded a grant of $5,971,053 for Cybersecurity Workforce Development from the National Security Agency (NSA). PNW says that with the funded projects, PNW will be able to contribute significantly to national workforce development in the field of AI and cybersecurity. The U.S. Department of Labor reports that the need for IT and cybersecurity professionals is projected to grow 12 percent from 2018 to 2028 with multi-million shortages.

  • Advancing Applied Research in Cybersecurity

    The Forge Institute, along with the University of Arkansas Fayetteville (UA-Fayetteville) and University of Arkansas Little Rock (UA-Little Rock), jointly announced a partnership to advance applied research in areas that support our national defense, including cybersecurity.

  • Machine Learning Algorithm May Be Key to Timely, Inexpensive Cyberdefense

    Zero-day attacks can overwhelm traditional defenses, costing organizations money and resources. A machine learning algorithm may give organizations a powerful and cost-effective tool for defending against attacks on vulnerable computer networks and cyber-infrastructure, often called zero-day attacks, according to researchers.

  • Creating a National Network of Cybersecurity Institutes

    DHS S&T, in partnership with the Cybersecurity and Infrastructure Security Agency (CISA), awarded $2 million to the University of Illinois at Urbana-Champaign (UIUC) to develop a plan that CISA can execute to build a national network of cybersecurity technical institutes. “CISA sees the growing cybersecurity workforce shortage in the United States as a national security risk,” said Bryan Ware, CISA assistant director of cybersecurity.

  • Legislation Introduced to Ban TikTok from Government Devices

    U.S. Senators Marco Rubio (R-FL), Josh Hawley (R-MO), and Rick Scott (R-FL) have introduced legislation that would ban all federal employees from using TikTok on government devices. The U.S. State Department, the Department of Homeland Security, the Department of Defense, and TSA have already banned TikTok on federal devices due to cybersecurity concerns and the potential for spying by the Chinese government.

  • Macro Cyber Resilience

    The prefixes of ‘macro’ and ‘micro’ have been applied to concepts like economics, or even to activities like photography. They are easy ideas to understand in large versus small scales. However, this term is not usually used to define cyber perspectives, an increasingly important area for security applications.

  • U.S. Expels Russian Diplomats, Imposes New Sanctions on Russia in Retaliation for Hacking, “harmful activities”

    The U.S. has imposed a new round of sanctions against Russia targeting what it calls the “harmful” foreign activities of Moscow. U.S. intelligence officials have pointed the finger at Russia for a massive hack known as SolarWinds that hit large swaths of the U.S. public and private sectors last year. Widely used software is believed to have been infected with malicious code, enabling hackers to access at least nine U.S. agencies, dozens of corporations.

  • Messaging Authoritarianism: China’s Four Messaging Pillars and How ‘Wolf Warrior’ Tactics Undermine Them

    A messaging strategy is only as good as the goal it serves; as Xi Jinping has made clear, China is seeking to make the world safer for its brand of authoritarianism by reshaping the world order. An analysis of messaging from China’s diplomats, state-backed media, and leaders of the Chinese Communist Party (CCP) demonstrates that Beijing repeatedly uses narratives, angles, and comparisons that serve to change perceptions about China’s autocracy and the United States’ democracy—to China’s advantage.

  • After the Islamic State: Social Media and Armed Groups

    The Islamic State is often credited with pioneering the use of social media in conflict, having created a global brand that drew between 20,000 and 40,000 volunteers from at least 85 countries. Social media served as a key recruiting tool, source of fundraising, and platform for disseminating graphic propaganda to a global audience. Laura Courchesne and Brian McQuinn write that the Islamic State perfected tactics and strategies already widely used by hundreds of other armed groups.

  • Harnessing Chaos to Protect Devices from Hackers

    Researchers have found a way to use chaos to help develop digital fingerprints for electronic devices that may be unique enough to foil even the most sophisticated hackers. Just how unique are these fingerprints? The researchers believe it would take longer than the lifetime of the universe to test for every possible combination available.

  • Global Security Trends

    The National Intelligence Council (NIC) on Thursday released the seventh edition of its quadrennial Global Trends report. Global Trends 2040: A More Contested World is an unclassified assessment of the forces and dynamics that the NIC anticipates are likely to shape the national security environment over the next twenty years. Global competition for influence will intensify. “During the next two decades, the intensity of competition for global influence is likely to reach its highest level since the Cold War,” the report notes.

  • Cybersecurity Guide Tailored to the Hospitality Industry

    A new practical cybersecurity guide from the National Institute of Standards and Technology (NIST) can help hotel owners reduce the risks to a highly vulnerable and attractive target for hackers: the hotel property management system (PMS), which stores guests’ personal information and credit card data. 

  • The U.S. Government Needs to Overhaul Cybersecurity. Here’s How.

    After the 2015 hack of the U.S. Office of Personnel Management, the SolarWinds breach, and—just weeks after SolarWinds—the latest Microsoft breach, it is by now clear that the U.S. federal government is woefully unprepared in matters of cybersecurity. Jonathan Reiber and Matt Glenn write that “it is time for a different model for cybersecurity. U.S. military bases have layers of walls, guards, badge readers, and authentication measures to control access. The United States needs the same mindset for its cybersecurity.”