-
CyberForce Competition Challenges College Students to Use Cybersecurity Skills to Defend Their Wind Energy System
College teams will work to outsmart a simulated attack on a U.S. wind energy plant. The CyberForce Competition offers students hands-on experience, igniting their passion for cybersecurity.
-
-
Subsea Communications Cables: Vital but Vulnerable
Ensuring the resilience of the submarine cable network against disruptions is crucial. Lying deep on the ocean floor, these fiber-optic cables can transmit massive amounts of data at high speeds with low latency, making them far more efficient than satellites, which handle only a fraction of global data transmission.
-
-
What We've Learned About the Hungarian, Bulgarian, and Norwegian Links To Hezbollah's Pagers
A Bulgarian company with Norwegian links has surfaced in the supply chain of the pagers that detonated in Lebanon this week, killing 37 people and injuring several thousand others. The pagers, which were being used by members of Hezbollah, Iran’s most powerful proxy in the Middle East and designated as a terrorist organization by the United States, exploded simultaneously across Lebanon on September 17.
-
-
Pagers and Walkie-talkies Over Cellphones – a Security Expert Explains Why Hezbollah Went Low-Tech for Communications
In general, I believe the adversary in an asymmetric conflict using low-tech techniques, tactics and technology will almost always be able to operate successfully against a more powerful and well-funded opponent. But from a cybersecurity perspective, Israel’s attack on Hezbollah’s pagers shows that any device in your life can be tampered with by an adversary at points along the supply chain – long before you even receive it.
-
-
Cybersecurity Suite Now on Duty Defending the Nation
For the better part of a decade, dozens of Sandia engineers, each working on pieces of a new national security tool alongside federal partners, have revolutionized cybersecurity forensics with the Thorium platform and tool suite.
-
-
Computer Scientists Discover Vulnerabilities in a Popular Security Protocol
A widely used security protocol that dates back to the days of dial-up Internet has vulnerabilities that could expose large numbers of networked devices to an attack and allow an attacker to gain control of traffic on an organization’s network.
-
-
It Is Time to Act
There is, in a basic sense, nothing new to be said about the global computer outage of the week just pas, Dan Geer writes, so the time to act is now. “If we choose to act on what we know, then we also know that security policy and competition policy are henceforth conjoined. We cannot and will not have zero cascade failures if any tech is allowed to become universal, to become a monopoly in its sphere.”
-
-
Massive IT Outage Spotlights Major Vulnerabilities in the Global Information Ecosystem
The global information technology outage on July 19, 2024, that paralyzed organizations ranging from airlines to hospitals and even the delivery of uniforms for the Olympic Games represents a growing concern for cybersecurity professionals, businesses and governments.
-
-
From Iron Dome to Cyber Dome: Defending Israel’s Cyberspace
In response to growing attacks against its infrastructure by formidable adversaries like Iran and its proxies, Israel recently announced that they are building a ‘cyber-dome’ or a digital ‘Iron Dome’ system to protect Israel’s cyberspace to defend against online attacks.
-
-
Supreme Court Rules Platforms Have First Amendment Right to Decide What Speech to Carry, Free of State Mandates
The Supreme Court last week correctly found that social media platforms, like newspapers, bookstores, and art galleries before them, have First Amendment rights to curate and edit the speech of others they deliver to their users, and the government has a very limited role in dictating what social media platforms must and must not publish.
-
-
Discovery Highlights ‘Critical Oversight’ in Perceived Security of Wireless Networks
Researchers have uncovered an eavesdropping security vulnerability in high-frequency and high-speed wireless backhaul links, widely employed in critical applications such as 5G wireless cell phone signals and low-latency financial trading on Wall Street.
-
-
ARPA-H Announces Program to Enhance and Automate Cybersecurity for Health Care Facilities
The Advanced Research Projects Agency for Health (ARPA-H) announced the launch of the Universal PatchinG and Remediation for Autonomous DEfense (UPGRADE) program, a cybersecurity effort that will invest more than $50 million to create tools for information technology (IT) teams to better defend the hospital environments they are tasked with securing.
-
-
University Students Tackle Adventure in CyberForce — Conquer the Hill Competition
University of Central Florida’s Cameron Whitehead wins CyberForce Conquer the Hill: Adventure Competition 2024. Whitehead was one of 112 students from 71 accredited U.S. colleges and universities who competed virtually to complete work-based cybersecurity tasks and challenges during a full day of energy sector-related adventure.
-
-
Cybersecurity Education Varies Widely in U.S.
Cybersecurity programs vary dramatically across the country, a review has found. The authors argue that program leaders should work with professional societies to make sure graduates are well trained to meet industry needs in a fast-changing field.
-
-
U.S. Needs a New Independent Armed Service — a U.S. Cyber Force: Report
In the U.S. military, an officer who had never fired a rifle would never command an infantry unit. Yet officers with no experience behind a keyboard are commanding cyber warfare units. This should change, as the need to create a new independent armed service — a U.S. Cyber Force – become more urgent by the day.
-