You can watch our panel’s video, “Partnering with Industry for Innovation,” and it will provide an up-to-the-moment view of how US Cyber Command and the Department of Defense as a whole are attacking the innovation challenge, featuring leadership from the USCYBERCOM Capabilities Development Group, and the Defense Innovation Unit-Experimental.
The FBI has arrested a National Security Agency (NSA) contractor who is accused of stealing and disclosing classified computer codes developed by the agency to hack foreign governments, The New York Times reports. Like former NSA contractor-turned-leaker Edward Snowden, Martin worked for Booz Allen Hamilton, which develops and operates many of the agency’s clandestine cyber tools, according to the Times. Booz Allen Hamilton declined to comment for this story.
With the U.S. general election coming up Nov. 8, it's a good time to take a forward-looking, party-neutral look at technology policy issues relevant in this election cycle. Cyber-security, as one might expect, tops any list of IT problems. If our personal and business information isn't secure -- and by most measures, basically nothing is completely safe at this time...
Security researcher and blogger Bruce Schneier has a new essay up, arguing that there’s a single body out there carrying out a systematic attempt to test the defenses of the internet’s fundamental infrastructure, presumably with the intention of one day breaking those defenses.
Yahoo has confirmed that hackers stole information from at least 500 million user accounts in what it describes as a “state-sponsored” attack. In a statement released Thursday, Yahoo’s Chief Information Security Officer Bob Lord said that the information was stolen from the company’s network in late 2014.
What is a secure technology environment in K-12 schools? It is a teaching and learning environment where students and teachers have access to the tools they need, yet adequately protects them from threats and things that could possibly harm them, such as accessing inappropriate content, online predators, cyberbullying, data and identity theft, viruses and malware, and copyright infringement.
The FBI has uncovered evidence that foreign hackers penetrated two state election databases in recent weeks, prompting the bureau to warn election officials across the country to take new steps to enhance the security of their computer systems, according to federal and state law enforcement officials.
This week (starting August 15), the immediate risk to our lives through cyberblitzkrieg has suddenly risen dramatically, due to new events in cyberspace. If a cyberblitzkrieg on electric power and other critical infrastructure does occur, the level of damage would be comparable in general to the kind of damage we feared at the height of the Cold War, when something like half the world could be lost suddenly and the rest in a cascade of events.
Security researchers have identified a complex malware dubbed “ProjectSauron” that hid, undetected, within a number of organizations for five years. Cybersecurity company Kaspersky Lab described ProjectSauron as an extremely sophisticated platform for cyber-espionage Monday. The malware, it added, is designed to conduct “long-term campaigns through stealthy survival mechanisms.”
The Obama administration is preparing to elevate the stature of the Pentagon’s Cyber Command, signaling more emphasis on developing cyber weapons to deter attacks, punish intruders into U.S. networks and tackle adversaries such as Islamic State, current and former officials told Reuters. Under the plan being considered at the White House, the officials said, U.S. Cyber Command would become what the military calls a "unified command" equal to combat branches of the military such as the Central and Pacific Commands.