Brexit, technology innovation, and communications regulations

From: ITProPortal


The UK government needs to take some large steps to provide the assurances that the technology sector needs.

Britain’s decision to leave the EU will challenge the ability of UK technology companies to innovate and grow. Companies have previously relied on the benefits of EU membership such as the freedom to manage and transfer data across the EU, and free movement of skilled labour to create huge opportunities for creativity and collaboration across the technology sector.


Central African States adopt cyber-security cross-border law

From: BizCommunity

BRAZZAVILLE, Congo (Republic of the) – An exacting endeavour of the Central African Economic Community (ECCAS) member states – supported by the Economic Commission for Africa (ECA) and the International Telecommunications Union (ITU) – has yielded fruit, with the adoption by countries of the sub-region, of model laws on telecommunications, cyber security and the regulatory framework to govern cross-border interconnection. 



NIST Announces CyberSeek, An Interactive Resource for Cybersecurity Career Information

From: NIST

The U.S. Commerce Department’s National Institute of Standards and Technology (NIST) today introduced CyberSeek (link is external), an interactive online tool designed to make it easier for cybersecurity job seekers to find openings and for employers to identify the skilled workers they need.

CyberSeek was announced at the 2016 NICE Conference in Kansas City, Missouri, by Rodney Petersen, director of the National Initiative for Cybersecurity Education (NICE), which funded development of the tool. The NIST-led NICE focuses on cybersecurity education, training and workforce development.


Judge rules against Center for Public Integrity in cybersecurity lawsuit

From: Center for Public Integrity

Newsroom weighing options in pursuit of secret FEC document

A U.S. District Court Judge has denied the Center for Public Integrity’s requestfor access to a taxpayer-funded study about cybersecurity vulnerabilities at the Federal Election Commission.

The court’s decision comes more than 13 months after the Center for Public Integrity sued the FEC for access to the security study, which the FEC commissioned following a Center investigation revealing how Chinese hackers infiltrated the FEC’s computer systems.

Read Complete Article


NIST Focuses on Cybersecurity of Connected Devices

From: EDM Digest

The NIST is concerned about the IoT, too

A popular trend in recent weeks is to address issues with cybersecurity of connected devices across the U.S. The National Institute of Standards and Technology (NIST) joined the IoT-security chorus this month by publishing a detailed report on security of Internet of Things (IoT) devices.

According to the NIST, “engineering-based solutions are essential to managing the growing complexity, dynamicity, and interconnectedness of today’s systems.” In a 257-page document, the measurement standards laboratory took an in-depth look at what should be done to bolster cybersecurity of connected devices.


Personal data for more than 130,000 sailors hacked: U.S. Navy

From: Reuters

Hackers gained access to sensitive information, including Social Security numbers, for 134,386 current and former U.S. sailors, the U.S. Navy said on Wednesday.

It said a laptop used by a Hewlett Packard Enterprise Services employee working on a U.S. Navy contract was hacked. Hewlett Packard informed the Navy of the breach on Oct. 27 and the affected sailors will be notified in the coming weeks, the Navy said.

Read Complete Article


Pentagon expands white-hat hacker challenge to all comers

From: 1500 am

By Jared Serbu

The Defense Department undertook a significant expansion of its new crowdsourced approach to cybersecurity Monday, opening its “Hack the Pentagon” challenge to literally anyone and providing them a legal route to report any security holes they find.

The program differs somewhat from other ongoing hacking challenges in which the Defense Department offered bounties to groups of pre-vetted white hat hackers in penetration tests against specific DoD systems. The new, broader initiative doesn’t include any financial rewards, but does include a centralized portal to report security flaws on publicly-accessible Defense networks and sets out a new policy under which hackers can feel free to prod live systems for bugs without fear of prosecution.


Cognitive Hack: The New Battleground In Cybersecurity

From: Forbes



From: Bloomberg/BNA


Janet Yellen, chair of the Board of Governors of the Federal Reserve System told Congress that cybersecurity “is one of the most significant risk our country faces.” Yellen called on financial institutions to make sure internal controls are in place to effectively respond to cybersecurity threats.

Cybersecurity issues pervade many industries across the U.S. and that data breaches and other hacking incidents directly impact industries from financial services to the technology sector. But hearing a warning from the top monetary policy official for the U.S. is still scary.

Read Complete Article


Two Big Moves at FDA

From: Medical Device + Diagnostic Industry

FDA launched two major initiatives in 2016—cybersecurity requirements and a national system for real-world device monitoring.

Jim Dickinson

The last year of the Obama Administration will likely be remembered by FDA-watchers for two major agency initiatives affecting medical device regulation: cybersecurity requirements and CDRH’s establishment of a National Evaluation System for “real world” device monitoring, one of three strategic priorities for the 2016-2017 timeframe.

Each of these has been under congressional scrutiny, something that both the Trump Administration and the reinvigorated Republican majorities on Capitol Hill seem likely to continue.

Older posts «