-
New technology allows for better communication on the battlefield
Multi-User Detection technology allows radios to transmit at the same time while sharing the same frequency; MUD allows more traffic on various networking systems, which is an advantage to military personnel with critical need for high throughput air-to-air, air-to-ground, and soldier-to-soldier communications
-
-
Cobham acquires MMI Research
Large U.K. defense contractor acquires specialist in cellular telecommunications for the law enforcement and national security markets
-
-
Japanese firms to begin IT security rating
Eighteen Japanese firms announced they were creating the world’s first ratings agency looking at data security, which they said was a rising concern for companies
-
-
SyTech Corporation and communication interoperability, I
The lack of communication interoperability among first response, rescue teams, and law enforcement during the 9/11 attacks and Hurricane Katrina was only the most dramatic and poignant demonstration of a persistent and debilitating flaw in U.S. agencies’ planning for disaster — and performing during disaster; communication interoperability is essential not only in disasters, but for routine, every-day operations of law enforcement; SyTech’s comprehensive approach to interoperability offers a solution
-
-
EU selects Symantec for WOMBAT project
WOMBAT aims to provide new means for understanding the existing and emerging threats which are targeting the Internet economy and its users; EU selects Symantec to do research for the project
-
-
U.S. military prepares for offensive cyber warfare
The new U.S. Air Force Cyber Command said it would be involved in protecting the U.S. critical infrastructure and financial institutions from hackers’ attacks; the military now says that it is preparing for offensive cyber operations
-
-
Cisco shows Cisco Open Platform for Safety and Security
New solution facilitates business continuity and force protection mission alike; in addition to incorporating Cisco’s own surveillance and network security technologies, new solution supports sensor integration and management, video analytics, geographic information system (GIS) framework for common operating picture, enterprise mass emergency notification, and physical access control
-
-
Microsoft joins MIT Kerberos Consortium
Kerberos develops the widely used network authentication standard; eight years ago Microsoft was accused of subverting the standard by adding proprietary extensions; after Microsoft lost both U.S. and European anti-trust trials, company joins consortium
-
-
Reported Internet crime losses increase by $40 million
In 2007, 206,884 U.S. citizens complained of being victims of Internet crime; 90,000 cases were referred to law enforcement; reported losses amounted to $240 million; most reported complaint: Fraudulent Internet auctions
-
-
U.S. Cyber Command to fight cybercrime
New Air Force command will be involved in fighting cyber crime which leads to information loss or possible physical attacks through denial of service
-
-
This weekend: 32nd annual computing Battle of the Brains
The 32nd annual collegiate programming contest will take place this weekend in Alberta, Canada; one hundred three-person teams from thirty-three countries have qualified; twenty of the teams represent U.S. colleges
-
-
Riding the Next Wave -- WiMAX versus LTE // by Peter Howard
By 2011, it is estimated that 1.5 billion people will have broadband; which technology will better serve their needs — WiMAX or LTE? WiMAX is already here, and LTE will take time to roll out — but when it does, it will give WiMAX a run for its money; LTE offers spectrum flexibility, significant added capacity, and a platform for delivering premium applications cost effectively
-
-
Private-sector support for telecommuting grows
Heightened concerns about traffic congestion, air pollution, and gasoline prices — and worries about business continuity — increase the attraction of telecommuting; new CDW report reveals that support for telecommuting grows, but is offset by security concerns
-
-
Preparing for the electromagnetic pulse (EMP) threat
One unexpected lesson of the many nuclear tests conducted by the superpowers in the late 1950s and early 1960s was that high-altitude nuclear blasts create far-reaching atmospheric effects that could instantly shut down power grids; as modern life becomes ever-more dependent on electronic gadgets, and as the proliferation of nuclear weapons and missiles continue, fear grows that an adversary will seek to cripple the United States by creating an atmospheric EMP effect
-
-
Rod Beckstrom to head NCSS
DHS taps Silicon Valley serial entrepreneur Rod Beckstrom to head new cyber security outfit; Beckstrom’s task is to secure the government IT systems
-
More headlines
Who's online
The long view
U.S. contemplates responses to a cyber-Pearl Harbor attack on critical infrastructure
Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11 or a digital Pearl Harbor, in which a computer attack would unplug the power grid, disable communications lines, empty bank accounts, and result in loss of life. “Ultimately, it absolutely could happen,” says one expert. “Yeah, that thought keeps me up at night, in terms of what portion of our critical infrastructure could be really brought to its knees.”
To bolster the world’s inadequate cyber governance framework, a “Cyber WHO” is needed
A new report on cyber governance commissioned by Zurich Insurance Group highlights challenges to digital security and identifies new opportunities for business. It calls for the establishment of guiding principles to build resilience and the establishment of supranational governance bodies such as a Cyber Stability Board and a “Cyber WHO.”
U.S. adopts a more assertive cyber defense posture
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.