One smart city standard to rule them all?

Editor’s Note: For guidance on the use of standards, see An Updated Look at the Federal Policies Governing How Agencies Use Voluntary Consensus Standards in Regulatory, Procurement, and Science Documents.

From: American City & County

By Jesse Berst


Why do we need standards?
Standards development for smart cities is taking place all over the world by a variety of standards organizations and consortia. As Chris Greer, director for NIST’s Smart Grid and Cyber-Physical Systems Program, described the situation: “The growth of the smart cities market is currently hindered by ICT deployments that are customized and not fully interoperable or scalable, as well as by the lack of convergence around architectural design principles and a common language or taxonomy. We want to avoid potentially divergent outputs from emerging standards activities and, instead, come up with a framework that will enable smart city solutions that meet the needs of modern communities.”


New schedule for military EHR rollout is imminent

From: FCW

By Adam Mazmanian

The Department of Defense will decide on a new schedule for the rollout of its new, commercial electronic health record product in the next seven to 10 days, according to a spokesperson.

The new health record system, dubbed MHS Genesis, was scheduled to have an initial operating capability in the Pacific Northwest by Dec. 31, 2016, to comport with the date set in the 2013 National Defense Authorization Act.

Read Complete Article


NIST Awards Grants to 5 Nonprofit Groups to Establish Regional Cyber Education, Workforce Devt Partnerships

From: ExecutiveGov

Five nonprofit organizations have received approximately $1 million in total grants from the National Institute of Standards and Technology to forge partnerships that seek to address the shortage of cybersecurity professionals in local communities.

NIST said Tuesday the Regional Alliances and Multistakeholder Partnerships to Stimulate grants are part of the Commerce Department’s Skills for Business initiative and will be administered by the National Initiative for Cybersecurity Education.

Read Complete Article


Pensions Regulator: Cyber security should be a key risk on risk registers

From: Pensions Expert

By Tom Dines

Trustee boards should be assessing their risk of cyber attack and taking steps to protect member data and scheme assets, the chief executive of the Pensions Regulator has said.

Experts have been predicting an increased focus on cyber security for some time now, with warnings of major losses if a pension scheme is hit by hackers.


“Pension schemes are likely to be attractive targets to cyber criminals, because they hold a lot of personal employment and financial data,” she said.

Read Complete Article


Xiaomi Can Silently Install Any App On Your Android Phone Using A Backdoor

From: Slashdot

Xiaomi, the Chinese smartphone manufacturer many refer to as the “Apple of China,” can silently install any app on your device, according to a Computer Science student and security enthusiast from the Netherlands. Thijs Broenink started investigating a mysterious pre-installed app, dubbed AnalyticsCore.apk, that constantly runs in the background and reappears even if you try and delete it. The Hacker News reports:

Read Complete Post


How reducing information systems ‘clutter’ could reduce cyber risk


By Jory Heckman

Moving federal information systems to the cloud could reduce a lot of the federal government’s IT “clutter,” but without the cybersecurity component, agencies won’t feel confident about migrating their data.

More than a year after massive data breach at the Office of Personnel Management, federal agencies remain on full alert when it comes to shoring up their cyber vulnerabilities.

Read Complete Article


UK government urged to adopt ‘new approach’ to data security


The UK government has been urged to adopt a “new approach” to data security by the National Audit Office (NAO).

The spending watchdog found that “too many bodies” within government have “overlapping responsibilities” for information security matters and that insufficiently clear information is collected by the government on the way it performs in protecting data or the costs involved.


Feinstein office: Leaked document not new encryption bill

From: The Hill

By Joe Uchill

On Friday, a well-esteemed security blog printed excerpts from what it said was a leaked copy of a rewritten Feinstein-Burr encryption bill. Sen. Dianne Feinstein’s (D-CA) office has since clarified that, while there was a document, it was not new draft legislation.

A source within Feinstein’s office familiar with the document says it was actually an internal brainstorming file being compiled by Feinstein’s staffers as they met with stakeholders in the encryption debate.  It is not, the source stressed, legislation the office or any office is currently considering.

Read Complete Article


CHIME Member Leads Healthcare Cybersecurity Task Force

From: HealthITSecurity


Information sharing is a key part to improving healthcare cybersecurity measures, especially as the healthcare industry is different from other sectors.

Creating a set of recommendations that anyone in the healthcare industry can utilize is one of several goals for the federal healthcare cybersecurity task force, according to co-chair and CHIME board member Theresa Meadows, R.N., CHCIO.



The Next President Will Decide the Fate of Killer Robots—and the Future of War

From: Wired

Heather M. Roff and P.W. Singer


This emerging reality has prompted debate—in places ranging from the Pentagon to the United Nations—on the need for policies, regulations, or, as some even argue, preemptive bans on AWS. Yet, to date only the US and its close partner the UK have created actual policies regarding those weapons, albeit limited. Both countries allow research to move forward on AWS, but set a goal to limit their deployment without appropriate human judgment or meaningful human control. In the US, the policy also has an out clause, allowing us to build and use the tech, if senior leadership deems it necessary.

Older posts «