President Joe Biden’s cybersecurity executive order, signed May 12, 2021, calls for the federal government to adopt a “zero-trust architecture.” This raises a couple of questions. What is zero-trust security? And, if…
President Joe Biden’s cybersecurity executive order, signed May 12, 2021, calls for the federal government to adopt a “zero-trust architecture.” This raises a couple of questions. What is zero-trust security? And, if…
Takeaways: · There are no easy solutions to shoring up U.S. national cyber defenses. · Software supply chains and private sector infrastructure companies are vulnerable to hackers. · Many U.S. companies outsource…
The FBI has the authority right now to access privately owned computers without their owners’ knowledge or consent, and to delete software. It’s part of a government effort to contain the continuing…
More than two-thirds of the Earth’s surface is covered by the oceans and seas. Over the next decade, these vast waters are expected to add $3 trillion to the global economy by…
Having your social media account hacked is a pain. Having your credit card account hacked can be devastating. Having your new electric vehicle hacked could be disastrous. As the move toward automated electric…
In 2018, industry and academic researchers revealed a potentially devastating hardware flaw that made computers and other devices worldwide vulnerable to attack. Researchers named the vulnerability Spectre because the flaw was built into modern…
From power grids and telecommunications to water supply and financial systems, digital data controls the infrastructure systems on which society relies. These complex, multi-tier systems depend on layered communications to accomplish their…
The U.S. Department of Homeland Security (DHS) Science and Technology Directorate (S&T) is expanding pilot testing of a technology to improve the cybersecurity defenses of America’s emergency communications infrastructure. S&T funded SecuLore…
Researchers have found a way to use chaos to help develop digital fingerprints for electronic devices that may be unique enough to foil even the most sophisticated hackers. Just how unique are…