-
Confronting Reality in Cyberspace: Foreign Policy for a Fragmented Internet
The global internet—a vast matrix of telecommunications, fiber optics, and satellite networks—is in large part a creation of the United States. Moreover, U.S. strategic, economic, political, and foreign policy interests were served by the global, open internet. The United States now confronts a starkly different reality. The utopian vision of an open, reliable, and secure global network has not been achieved and is unlikely ever to be realized. Today, the internet is less free, more fragmented, and less secure.
-
-
The Strategic Relevance of Cybersecurity Skills
Evidence suggests there is a global cybersecurity skills shortage affecting businesses and governments alike, which means that organizations are struggling to fill their cybersecurity vacancies. Tommaso De Zan writes that “the absence of cybersecurity experts protecting national critical infrastructures constitutes a national security threat, a loophole that may be exploited by malicious actors.”
-
-
IBM, Historically Black Colleges Partner to Tackle Cybersecurity Talent Shortage
In 2020, the talent shortage in the U.S. has more than tripled over ten years, with 69 percent of employers surveyed struggling to fill skilled positions. By September 2021, there were more than 1.2 million U.S. job vacancies postings in software-related professions. IBM joins with Historically Black Colleges & Universities to launch cybersecurity degree programs.
-
-
A Peak at the Nation’s Future Cybersecurity Workforce
Hack the Port 22, hosted jointly by USCYBERCOM and the Maryland Innovation and Security Institute, brought together subject matter experts from government, industry, and academia to highlight the nation’s critical infrastructure and cyber defense priorities.
-
-
Researchers Team Up to Launch $1.5 Million Virtual Cybersecurity Institute
An interdisciplinary group of researchers is teaming up to co-lead a new $1.5 million virtual institute that will help train the next generation of cybersecurity professionals for future military and civilian leadership positions.
-
-
Russia’s Cyber War: What’s Next and What the European Union Should Do.
The EU has made long-term changes which will improve it’s cybersecurity. However, the bloc needs to make a series of short-term changes to guard against potential Russian cyberattacks.
-
-
Cyber and Physical Security Should Collaborate: What Does It Take to Achieve This
To understand and mitigate threats that cross the boundary between what is cyber and what is physical, some organizations have integrated their security resources to encourage them to work more closely together.
-
-
The Digital Skills Gap: What Workers Need for the Jobs of the Future
The COVID-19 pandemic quickened the pace of digital development around the world, as everything from meetings to movie premiers went online. That may sound like a silver lining. For tens of millions of workers, it’s not. They don’t have the skills to compete.
-
-
CISA Supports Inaugural U.S. Cyber Games
CISA last week announces its founding sponsorship of the first-ever US Cyber Team, which will compete, as part of the US Cyber Games, in the International Cybersecurity Challenge (ICC) June 14-17, 2022 in Athens, Greece. “Cyber competitions are a fundamental element of developing the next generation of cybersecurity talent. Games help motivate the future workforce, and keep the current workforce sharp, maintaining a thriving community of cybersecurity professionals,” noted CISA Director Jen Easterly.
-
-
Africa embraces Huawei technology despite security concerns
Shunned in the Global North due to privacy and security issues, Huawei is a front-runner in Africa. But the Chinese giant’s data collection methods may also appeal to authoritarian regimes as a way to cling to power.
-
-
NSA Releases 2021 Cybersecurity Year in Review
The NSA last week released its 2021 NSA Cybersecurity Year in Review which highlights how the agency continues to address threats to the U.S. most critical systems.
-
-
Automated Approach to Extract Security Policies from Software
Researchers are exploring how a new automated approach could prevent software security vulnerabilities. The researchers sought to develop a deep learning model that could teach software how to extract security policies automatically.
-
-
Strengthening Cybersecurity Scholarship and Education
The National Science Foundation (NSF) has awarded $3.9 million to Georgia State University as part of its CyberCorps Scholarship for Service (SFS) program. The grant will fund a project that aims to address the growing need for a highly skilled national cybersecurity workforce.
-
-
$3.5 Million NSF Grant to Fund Cybersecurity Scholarships
A $3.5 million grant will fund new scholarships at Binghamton University over the next five years for two dozen students who plan to join the workforce as cybersecurity professionals. The NSF’s CyberCorps Scholarship for Service program trains the next generation of information technology experts and security managers.
-
-
How 5G Puts Airplanes at Risk – an Electrical Engineer Explains
In 2021 the U.S. government auctioned part of the C-band spectrum to wireless carriers in 2021 for $81 billion. The carriers are using C-band spectrum to provide 5G service at full speed, 10 times the speed of 4G networks. The C-band spectrum is close to the frequencies used by key electronics that aircraft rely on to land safely. Here’s why that can be a problem.
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.