DHS plans to begin an automated threat information sharing program for the private sector this month. Not everyone is enthusiastic, but some think the department can be a catalyst for improved cybersecurity collaboration.
Publications
Utah, other states, begin embracing drone hobbyists community
The FAA has been cracking down on people flying drones in Washington, but other states are embracing their drone-flying communities, training them and turning them into auxiliary volunteer air forces ready to help out their communities. Read all about it in the latest Emerging Tech column from NextGov.
Proposed updates of Emergency Alert System raises some concerns
The FCC has proposed new rules that could streamline and expand the nation’s Emergency Alert System, but one commissioner calls the proposed changes a power grab to expand the commission’s authority to the Internet.
How Battery Technology is Charging Ahead
Innovations in microchips and semiconductors keep pushing advances in mobile computing devices, yet the battery technology that helps power those same devices remains stagnated. By some accounts, lithium-ion batteries haven’t changed much over the past 15 years. That could change soon with developments in next-generation solid-state batteries. Vacuum manufacturer Dyson’s recent investment in a solid-state … Continue reading How Battery Technology is Charging Ahead
Why Cybersecurity Certifications Matter — Or Not
Cybersecurity certification qualifications are becoming the norm in many job descriptions today as organizations seek quantifiable ways of measuring prospective employees’ expertise. But certification alone should not be the yardstick in determining how well a potential candidate will fit into an organization. At the end of the day, experience as well as certification should be … Continue reading Why Cybersecurity Certifications Matter — Or Not
One-time-password theft highlights challenges for 2-factor authentication
Malware for stealing out-of-band passwords for two-factor authentication demonstrates the need to maintain good security on mobile devices.
A new wrinkle in Search Engine Optimization
A sophisticated campaign using SQL Injection for Search Engine Optimization has been spotted by Akamai’s Threat Research Division, raising some questions about what is legitimate and what is proper.
How To Convince Management You Need More People
As high profile cyberattacks make headlines, board members and senior management of companies large and small recognize that these attacks pose real threats to their revenue and reputations. As a result, investments in information security are essential. So it would seem that chief information security officers should have few problems convincing upper management that they … Continue reading How To Convince Management You Need More People
TWB reaching out with new YA novel to support STEM education
The Tech Writers Bureau reaches out with a new Young Adult fantasy novel designed to support STEM education for young people. The novel is currently being considered for publication by the Amazon Kindle Scout program, and everyone who backs it now will receive a free copy once the book publishes.
DeepSpec: A new frontier in software development
A new multi-institutional project funded by NSF aims to bring software development from an art to a science, using formal logic and precise specifications for program behavior to create software that is verifiably reliable.