• “Our president should be chosen by American citizens, not by foreign adversaries or interests”

    Thirty-one members of the Aspen Institute Homeland Security Group, a bipartisan group of homeland security and counterterrorism experts, last week have issued a statement on the recent Democratic National Committee (DNC) hack. “[T]his is an attack not on one party but on the integrity of American democracy. And it may not be the end of such attacks. It is not unthinkable that those responsible will steal and release more files, and even salt the files they release with plausible forgeries,” members of the group write. “This is unacceptable. Our president should be chosen by American citizens, not by foreign adversaries or interests.”

  • U.S. to issue new policy directive for coordinated government response to cyberattacks

    The administration is set to release a new directive on how the government should respond to significant cyberattacks. The release of the directives aims to clarify the responsibilities of agencies involved in security breaches. The presidential directive comes against the backdrop of an increasing number of cyberattacks by criminals and foreign governments.

  • Automated cybersecurity systems get set for final face-off at DARPA’s Cyber Grand Challenge

    The Heartbleed security bug existed in many of the world’s computer systems for nearly two-and-a-half years before it was discovered and a fix circulated in the spring of 2014. The reason for this time lag? In contrast to the sophistication and automation that characterize so much of today’s computer systems, the process of finding and countering bugs, hacks, and other cyber infection vectors is still effectively artisanal. But what if that system of finding and fixing flaws were just as fast and automated as the computer systems they are trying to protect? What if cyber defense were as seamless, sophisticated, and scalable as the Internet itself? These are questions at the heart of DARPA’s Cyber Grand Challenge.

  • How to stay anonymous online

    Anonymity networks protect people living under repressive regimes from surveillance of their Internet use. But the recent discovery of vulnerabilities in the most popular of these networks — Tor — has prompted computer scientists to try to come up with more secure anonymity schemes. These scientists have developed a new anonymity scheme that provides strong security guarantees but uses bandwidth much more efficiently than its predecessors, making it possible for network to protect users’ anonymity if all but one of its servers are compromised.

  • DHS S&T funds efforts to make Internet of Things safer

    DHS S&T the other day awarded $119,000 to Ionic Security, Inc. based in Atlanta, Georgia, to advance detection and monitoring for Internet of Things (IoT) systems security. The Ionic Security team proposes to apply a novel distributed data protection model to solve the authentication, detection, and confidentiality challenges that impact distributed IoT devices.

  • DHS S&T awards Charles River Analytics $500,000 for predictive malware defense research

    Malicious cyber activity is growing at an unprecedented rate. A leading internet security firm reported there were more than 317 million new malicious code signatures in 2014. Additionally, attacks are increasing in sophistication as authors create malware that circumvents standard signature-based antivirus defense systems. DHS S&T has awarded $500,000 to Cambridge, Massachusetts-based Charles River Analytics to develop malware defense technology that will alert and empower information technology (IT) administrators to fend off an impending cyberattack.

  • Intelligence agencies spy on our data by manipulating computer chips

    Researchers work to develop mechanisms that will render the Internet of Things more secure. They focus on a specific security gap: the manipulation of computer chips, that is, hardware components. These components can be found not only in PCs and laptops, but also in all other devices with integrated electronics; those include credit cards, cars, and smartphones, as well as large industrial facilities and medical equipment.

  • Nation’s elite cybersecurity talent participate in U.S. Cyber Challenge program

    A week from today, Illinois’ top cybersecurity talent will descend upon Moraine Valley Community College outside of Chicago to participate in the annual U.S. Cyber Challenge (USCC) Cyber Camp. During the week-long camp, individuals will participate in a variety of classes that cover such subjects as packet crafting and pen testing, and compete in a virtual Capture the Flag competition to demonstrate their cybersecurity abilities in a free-form environment in hopes of winning one of the limited (ISC)2 scholarship vouchers.

  • NIST to refine Cybersecurity Framework after comments from stakeholders

    NIST is developing a minor update of its Cybersecurity Framework based on feedback from its users. In the just-released Cybersecurity Framework Feedback: What We Heard and Next Steps, NIST is announcing that a draft of the update will be published for comment in early 2017.

  • Closing security gaps in the Internet of Things

    Cars, fridges, household appliances – in the future, many everyday items will be online. This opens up numerous new targets for attacks. IT experts are developing protection mechanisms. The experts are developing a new method for detecting and fixing vulnerabilities in the applications run on different devices — regardless of the processor integrated in the respective device.

  • HIPAA audits and what you need to consider to keep your organization compliant

    HIPAA has long been a regulation which has been confusing, in many aspects requiring a legal degree to understand the complexity and exactly how to become and remain complaint.HIPAA was enacted in 1996, and it has taken twenty years for it to become the elephant in the room it is today.The regulation has become more sophisticated based on the overwhelming increase in data breaches with the medical industry experiencing the greatest impact.

  • Harnessing solar, wind energy in one device to power the Internet of Things

    The “Internet of Things” could make cities “smarter” by connecting an extensive network of tiny communications devices to make life more efficient. But all these machines will require a lot of energy. Rather than adding to the global reliance on fossil fuels to power the network, researchers say they have a new solution.

  • How Israel became a cybersecurity superpower

    Israel’s rise as one of the world’s leaders in cybersecurity has been boosted by cooperation between the military, government, education, and private sectors, a level of partnership unmatched in the Western world. Israel’s cybersecurity sector is now worth half a billion dollars annually — second only to the United States.

  • Cybersecurity cracks the undergraduate curriculum

    In a time when million-dollar security breaches of household name corporations regularly make headlines and complicate lives, computer science undergraduates at America’s universities remain surprisingly underexposed to basic cybersecurity tactics. the Software Assurance Marketplace (SWAMP), a national cybersecurity facility housed at the Morgridge Institute for Research in Madison, Wisconsin, has been working to address this skills gap by offering a suite of software security tools that Bowie State has been integrating into undergraduate coding courses, giving students a way to examine and rid their code of security weaknesses.

  • Argonne hosts Cyber Defense Competition

    More than seventy-five aspiring cyber defenders from across Illinois and Iowa converged last Saturday on the U.S. Department of Energy’s (DOE’s) Argonne National Laboratory to take on the challenge of Argonne’s first Collegiate Cyber Defense Competition. The competition provided a strong challenge for eight teams from seven colleges, forcing them to defend simulated power utility networks from a variety of realistic attacks by a “Red Team” made up of cyber experts from Argonne and industrial partners.