-
Cyber crime bigwigs using big-business tactics
Cisco cybercrime reports says “The novel thing is that [cybercriminals] have taken the Harvard Business School, General Electric board room business training and applied it to their old techniques”
-
-
SAIC acquires Atlan
Large federal contractor acquires McLean, Virginia-based Atlan, a specialist in cybersecurity product testing and certification of FIPS 140-2 and 201 for product vendors
-
-
Competition between Symantec, McAfee intensifies
With growing consumer awareness of cybersecurity threats, the competition between the two leading cybersecurity companies intensifies; McAfee has been lagging, but new leadership and willingness to take risks have improved its market position
-
-
Inkjet printer technology to be used in biosensors
Researchers describe a method for printing a toxin-detecting biosensor on paper using a FujiFilm Dimatix Materials Printer; the method relies on a “lateral flow” sensing approach similar to that used in a home pregnancy test strip
-
-
Practical guides to disaster recovery planning in SMEs
Gartner says that “40% of all SMBs will go out of business if they cannot get to their data in the first 24 hours after a crisis”; two papers aim to help SMBs prepare for disaster
-
-
Using cell phones to predict floods
Researchers show that variations in microwave transmissions, specifically those used to connect up cell towers, can be used to measure humidity and thus predict flooding
-
-
Experts: local and regional approach better for addressing radioactive waste
The Obama administration has stopped funding for the Yucca Mountain nuclear waste repository, so experts say it is now time for a regional and local approach to solving the nuclear waste problem
-
-
South Korea says cyber attackers used IP address in 16 nations
South Korea’s intelligence agency — the NIS — said that the 4-8 July attacks on U.S. and South Korean Web sites and networks used 86 IP addresses in 16 countries; the NIS also briefed South Koran lawmakers on circumstantial and technical reasons for believing that North Korea could be behind the attacks
-
-
Experts differ on seriousness, and source, of attacks on U.S. Web sites
Between Monday and Wednesday, public and private computers in the U.S.— among them the White House, the New York Stock Exchange, and the Washington Post — were targeted for a broad and sustained attack; some of these computers were taken down for a while; experts disagree on the seriousness of the attack — or its source
-
-
Number of U.K. data breach incidents on the rise
Security breaches in the U.K.— in both the private and public sectors — are on the rise; one third of firms unaffected by data loss incident had introduced an enterprise-wide encryption policy
-
-
DHS's Einstein 3 plans raise questions
DHS wants to use Einstein 3 to bolster cybersecurity; the deployment of this powerful program has its critics, though
-
-
Administration's cybersecurity spending would benefit commercial vendors
The United States expects to spend about $7.3 billion on cybersecurity in fiscal 2009; which firms would benefit from government spending increases? It is likely the commercial software vendors
-
-
NSA to build $2 billion data center in Utah
The NSA major data center — in Fort Meade, Maryland — has maxed out the capacity of the Baltimore area power grid; the super-secret agency is building a second data center in San Antonio, Texas, and has revealed plans to build a third center — a mammoth, 65 MW, $1.93 billion in Camp Williams, Utah
-
-
European researchers create largest quantum key distribution network
Researchers from several European institutions unite in creating the largest quantum key distribution network ever built; a big step toward practical implementation of quantum encryption
-
-
U.S. official says administration is serious about cybersecurity
President Obama, on 29 May, outlined his administration’s cybersecurity strategy; skeptics said they heard such plans promoted before — but administration officials say this time they are serious
-
More headlines
The long view
Helping Strengthen America’s Critical Infrastructure
Everyday life depends on a robust infrastructure network that provides access to running water, communications technology and electricity, among other basic necessities. The experts who keep our national infrastructure secure and resilient also need a strong network to share their knowledge and train the next generation of professionals capable of solving complex infrastructure challenges.
AI and the Future of the U.S. Electric Grid
Despite its age, the U.S. electric grid remains one of the great workhorses of modern life. Whether it can maintain that performance over the next few years may determine how well the U.S. competes in an AI-driven world.
Using Liquid Air for Grid-Scale Energy Storage
New research finds liquid air energy storage could be the lowest-cost option for ensuring a continuous power supply on a future grid dominated by carbon-free but intermittent sources of electricity.
Enhanced Geothermal Systems: A Promising Source of Round-the-Clock Energy
With its capacity to provide 24/7 power, many are warming up to the prospect of geothermal energy. Scientists are currently working to advance human-made reservoirs in Earth’s deep subsurface to stimulate the activity that exists within natural geothermal systems.
Experts Discuss Geothermal Potential
Geothermal energy harnesses the heat from within Earth—the term comes from the Greek words geo (earth) and therme (heat). It is an energy source that has the potential to power all our energy needs for billions of years.