Archive for April, 2016
From: Imperial Valley News
Written by Chad Boutin
Washington, DC – If an exotic quantum computer is invented that could break the codes we depend on to protect confidential electronic information, what will we do to maintain our security and privacy? That’s the overarching question posed by a new report from the National Institute of Standards and Technology (NIST), whose cryptography specialists are beginning the long journey toward effective answers.
From: Open Source Intelligence
“If you have a credit card number, a name, and any kind of personal information such as the name of their wife or the name of their pets — anything which can be used to guess a password — you can get your hands on anything you want. It’s a very efficient product” said Apolline Aigueperse, lead cyberrisk analyst at cybersecurity firm CybelAngel, speaking at the recent Security & Counter Terror Expo in London.
We’ve learned to protect our online image, but that’s inconvenient for a site that wants every gory detail of our lives.
Facebook’s role in the world has changed though I didn’t expect to have an epiphany about that while sitting in the pews of a drafty, 11th-century church. It was at a wedding earlier this month, and the program handed out bore a disclaimer that would have been mystifying a few years ago. “Roger and Stephanie* would like to request that guests DO NOT post any photos of the ceremony, or share anything to social media relating to the day.” Instead of wanting to broadcast their special moments to the world, they were actively asking people to do the opposite. The truth is that Facebook was designed for people to spill their guts, but now more people are deciding that their privacy is more important.
Editor’s Note: Cross-posted from OIRA Watch.
In October 2012, the Chairman and Ranking Member of the House Intelligence Committee issued a joint statement warning American companies that were doing business with the large Chinese telecommunications companies Huawei and ZTE to “use another vendor.”
The bipartisan statement cited the Intelligence Committee’s Report that
“highlights the interconnectivity of U.S. critical infrastructure systems and warns of the heightened threat of cyber espionage and predatory disruption or destruction of U.S. networks if telecommunications networks are built by companies with known ties to the Chinese state, a country known to aggressively steal valuable trade secrets and other sensitive data from American companies.”
From: Think Progress
A wealthy New Orleans real estate developer has created “Uber for cops,” an app that allows anyone with a smartphone to report nonviolent criminals, drug dealers, homeless people and others they feel may be “suspicious.”
According to the creator, Sidney Torres, the French Quarter Task Force app is a user-driven platform that allows bystanders to identify and photograph suspicious behavior and alert cops about where the suspected culprits are located. The app focuses on petty nonviolent crime not usually considered emergencies by law enforcement. Torres says the app would make it easier for cops to know exactly where to find a suspicious person or if a crime — the list offers categories like theft, vandalism, carrying of weapons, drug dealing, assault, prostitution, or “aggressive solicitation” — is in progress.
Security concerns increase as more federal offices offer workers greater flexibility through telework options and the ability to use their own devices.
IT leaders at federal agencies have embraced increased use of mobility to transform their enterprises. However, as more offices have offered telework options and embraced bring-your-own-device (BYOD) policies to varying degree, security vulnerabilities have also cropped up.
***Public comments on the draft guidance were due on April 15.
Former New York regulator Benjamin Lawsky, who oversaw what many consider the most restrictive state bitcoin regulation known as BitLicense, now works as a counsel and media liaison for Axoni, a blockchain technology firm that uses blockchain in settling derivative transactions, according to Reuters.
Lawsky said he intended to start a consulting business when he announced his departure from the New York Department of Financial Services last spring, CCN reported. As a regulator, Lawsky had a reputation for consistently pushing for larger fines and stricter rules.
From: NATO Cooperative Cyber Defence Centre of Excellence
1500 virtualised systems are deployed during Locked Shields 2016. The virtualized Blue Team networks are custom-built and include a variety of services and platforms.
Locked Shields 2016 is organised in cooperation with the Estonian Defence Forces, the Finnish Defence Forces, the Swedish Defence College, the British Army, the United States European Command, and numerous other partners.
From: Our Water Counts Blog
Written by Jonathan Litchman
Connecticut Governor Daniel Malloy released the state’s long anticipated Cybersecurity Action Plan for utilities that include the water sector. The Connecticut Public Utilities Regulatory Authority (PURA) began the process of developing a cybersecurity regulatory approach two years ago that has been thoughtful, risk-based and collaborative. The result is cybersecurity regulation that is both flexible and reasonable.
From: Payments Journal
Donald J. Mosher, Lisa A. Prager, Michael L. Yaeger, Melissa G.R. Goldstein and Kimberly G. Monty |Schulte Roth & Zabel