Russia hacking hack cyber-min

An August 5 alert issued by Microsoft’s Security Response Center is blowing the whistle on hacking efforts focused on three classes of internet of things (IoT) devices that Microsoft asserts are being attacked by the hacking group it identifies as “Strontium,” better known as the Russia-based cyber espionage group Fancy Bear. […]

The National Institute for Standards and Technology (NIST) released a draft interagency report to establish a core baseline guide for cybersecurity that manufacturers may adopt for Internet of Things (IoT) devices they produce.






[…]

NIST
Cyber America Connected Internet of things

Senators and panelists across government and industry came to agreements, but also butted heads, about steps to take in strengthening Internet of Things (IoT) cybersecurity at an April 30 Senate Commerce, Science, and Transportation Security Subcommittee hearing.






[…]

5G wireless infrastructure technology

Federal government officials warned about the risks and challenges of rolling out 5G wireless networks – particularly in terms of the threat China poses in its global advancement of 5G – and emphasized that use of public-private partnerships in developing America’s vision for 5G networks will be critical for ensuring network security and staying internationally competitive.






[…]

Never, in human history, have we seen this much technological change in such a short period of time. As technology grows more powerful, every facet of society has raced to adapt. It is exciting (and perhaps a bit daunting) that approaching advancements will probably hit faster, and may be even more dramatic, than changes that […] […]

IoT Connected Devices Internet of Things

The proliferation of the Internet of Things (IoT) is soon to be accelerated with the arrival of 5G, which promises a world of smart devices that can improve everything from public transportation and driverless cars to remote medical care.






[…]

Keeping up with hackers is no small task, particularly since some attacks can be sustained in near-perpetuity. No doubt, securing cyberspace is a daunting responsibility. But focusing on security and using emerging technologies can help us meet the challenges. In particular, when the cyber security personnel of cloud providers and cloud customers work closely together, […] […]

5G wireless infrastructure technology

Experts at a Brookings Institution panel discussion agreed today that 5G wireless technology has the potential to impact tech policy on Capitol Hill and beyond, including historically disadvantaged communities with people of color and those who live in rural areas where internet access is not as readily available as in more populated areas.






[…]

GAO government accountability office
cloud computing concept -min

Expect to see more data breaches, attacks on critical infrastructure in the cloud, and more research into vulnerabilities into cloud computing in 2019, according to studies on upcoming threats in the new year.






[…]

Internet of Things IoT sensors devices internet-connected smart city

Rep. Robin Kelly, D-Ill., will introduce new legislation this week to “address cyber vulnerabilities created by the adoption of Internet-connected devices,” and specifically cyber threats of internet of things (IoT) devices owned and used by the Federal government.






[…]

It’s hard to know for certain what the U.S. economy will look like in 10 years’ time, much less what the work day will look like. One thing we do know: As younger generations enter the workforce, they will bring new habits, technology, conventions, and expectations that will likely transform business and government. With the […] […]

Internet of Things IoT Data Architecture diagram

The Aspen Cybersecurity Group (ACG), which was formed last year by the Aspen Institute think tank to “translate pressing cybersecurity conversations into action,” has issued several policy recommendations to bolster the security of internet of things (IoT) devices including suggesting that device manufacturers invest more in building in better security, and that manufacturers be held accountable for the security of devices that they make.






[…]

NASA JPL blog series

When the term “ubiquitous computing” was first coined in the late 1980s, it was envisioned as a sea of electronic devices “connected by wires, radio waves, and infrared,” that are so widely used, nobody notices their presence. By that definition, the era of ubiquitous computing arrived some time ago. Everything from movie theater projectors to […] […]

Officials from the Federal Trade Commission (FTC) and the Department of Homeland Security (DHS) noted the importance of enforcing and creating programs to support data security and privacy for Internet of Things (IoT) devices during the Internet of Things Global Summit on Thursday.






[…]

Internet of Things IoT Data Architecture diagram

The National Institute of Standards and Technology today released a new draft publication that takes a deep dive into the issue of trust: how can we trust that the products creeping into every aspect of our day-to-day lives are secure, safe, respect user privacy, and are ultimately tools we can depend on?






[…]

1 2 3

Categories