All Activity

This stream auto-updates   

  1. Earlier
  2. “The cyber threat is simultaneously a national and homeland security threat and a counterintelligence problem.” View the full article
  3. Ransomware, Hacks, and Cybersecurity Issues: As long as there are users there will be issues Various media outlets have reported a dramatic rise in ransomware attacks and the NY Times reported that the most recent attacks impacted over 200,000 machines running the Windows operating systems (OS), across 150 countries. The NYTimes article posits that hospitals, […] View the full article
  4. View the full article
  5. View the full article
  6. For full text, see our post. Once again, the NIST Framework is key. Each Agency has 90 days to provide a risk management report to the Secretary of Homeland Security and the Director of the OMB. DHS, OMB, Commerce, General Services and the White House staff then have 60 days to submit to the President […] View the full article
  7. For Immediate Release May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure EXECUTIVE ORDER – – – – – – – STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States […] View the full article
  8. Cybersecurity: House Committee Looks to Build on Public-Private Partnerships (RAPS): Many proposed plans or recommendations for addressing the myriad of cyber security challenges today involve some emphasis on establishing relationships between the public and private sector. According to one report earlier this week, the House Energy & Commerce Committee held a hearing to explore how to […] View the full article
  9. The Pew Research Center recently conducted an online survey on cyber security. The majority of participants were unable to answer even half of the questions correctly. The article reporting the results contains a link to the 13 question quiz so you can see how you compare to the average American. According to the article, the […] View the full article
  10. Syracuse University came out on top in new rankings for the best college cyber security programs. Military Times produced the rankings, which had University of Nebraska-Omaha, Drexel University, Bellevue University, and University of Maryland finishing two through five, respectively. An article discussing the results and methodology explained that several factors were taken into consideration. One […] View the full article
  11. Gorsuch on Cyber-Related Issues: Part Two (Lawfare): Two weeks ago, we recapped the first in a series of posts covering Supreme Court Justice nominee Neil Gorsuch and his depth of knowledge in cyber. The second part was posted last week and covered computer searches, specifically in the context of timeliness and particularity. The post discusses Gorsuch’s […] View the full article
  12. Former NSA Inspector General Releases Cybersecurity Recommendations For Trump (WBUR Boston): A recent article summarized an MIT report that recommended eight ways for President Trump to secure critical infrastructure. The article said that the report featured guest writing from former NSA IG Joel Brenner, and advocated for including the private sector. The article contains some quotes from […] View the full article
  13. Congress just killed your Internet privacy protections (CNN): Congress voted along party lines to repeal internet privacy protections yesterday. According to one article, the fate of privacy now rests with President Trump and the White House is on the record as “strongly support[ing]” the repeal. The rules had not yet taken effect, but would have required […] View the full article
  14. NATO to Seek Bids for $3.2 Billion in Satellite, Cyber Security (Bloomberg): Pending NATO contracts will focus on satellite communications, air and missile defense systems, software, and cyber security. An article said that the $3.2 billion commitment is representative of the organization’s adjustment to new threats, including those from Russian meddling and increased cyber attacks. Specifically, […] View the full article
  15. As we continue to move to a world wherein all things are networked and even toys now have connections to the cloud, people need to be cognizant and careful. According to the Hacker News, in 2015 the toy manufacturer VTech revealed that they had suffered a data breach which resulted in the exfiltration of personally […] View the full article
  16. New leak exposes a trove of personal passwords and sensitive info (Mashable): News over the weekend suggests that a recent leak could be one of the most devastating in recent memory. The report says that Cloudflare, one of the biggest websites for internet security, was the victim of a hack. Unfortunately, according to the article, the extent […] View the full article
  17. A report released last week took a different approach to cyber security. Instead of analyzing all the breaches that occurred and looking for trends there, the report surveyed the threats themselves. Nuix’s “Black Report” surveyed 70 different hackers at a conference to see the cyber security world through their eyes. The report, which is included […] View the full article
  18. How Israel became a leader in cybersecurity and surveillance (Miami Herald): Israel has become one of the world’s best countries in cyber security despite its small size, a recent article says. Second only to the U.S. in cyber capabilities, the article explains how Israel’s cyber strength has developed through an elite unit in the Israeli […] View the full article
  19. Reworked N.Y. Cybersecurity Regulation Takes Effect in March (Bank Info Security): New York’s controversial cybersecurity regulations will take effect March 1, 2017. A recent article discussed the revised regulation and how it is the first of its kind. NY Governor Andrew Cuomo stressed that the state is the financial capital of the world, […] View the full article
  20. Blockchain, Burning Man, and the Future of Governance: A Conversation with John Clippinger (Forbes): An article this morning by Robert Wolcott, Co-Founder and Executive Director of the Kellogg Innovation Network at Northwestern University, discusses Wolcott’s conversation with John Clippinger, who is the founder of the Institute for Data-Driven Design and a research scientist at MIT. One […] View the full article
  21. IBM Turns Watson Into A Cybersecurity Weapon Amid White House Interest (Forbes): IBM’s large investment into its cognitive software Watson has expanded into the cyber security field, a recent report says. Watson has the ability to read millions of documents and huge quantities of information and produce an analysis that humans cannot, the article said. […] View the full article
  22. The Pew Research Center recently released an in depth report analyzing how the average American feels about cybersecurity. The study consisted of several surveys regarding how Americans feel on certain cyber issues. The report says that 64% of Americans have personally been involved in a major data breach. As a result, about half […] View the full article
  23. Trump cybersecurity order morphs into 2,200-plus-word extravaganza (The Register): The revised version of President Trump’s Executive Order on cyber security has broken the mold, a recent report says. Executive Orders are normally concise and set forth general policy objectives, but this one is over two thousand words and calls for 10 different reports, the article said. […] View the full article
  24. NSA contractor indicted over mammoth theft of classified data (Reuters): A former contractor for the National Security Agency was indicted on charges of willfully retaining national defense information, a report yesterday said. The data theft could be the biggest ever, according to the article, but it is unclear what, if anything, was done with the […] View the full article
  25. Big changes in Trump’s cybersecurity executive order (CNN): Reports Tuesday that President Trump would be signing an Executive Order addressing cyber policies ultimately ended with him just discussing the content of the order with his lead advisers, according to a CNN article. The report says that major changes are coming to the way the […] View the full article
  26. Several weeks ago, this blog reported on a letter advocating that now President Trump consider using blockchain. That post included a guide to blockchain and how it works, particularly in its most common form of bitcoin. Apparently the Chinese find merit in that idea, as a recent report says that they have begun to […] View the full article
  1. Load more activity