address

now browsing by tag

 
 

NSF #investments aim to #address growing #cybersecurity challenge

Source: National Cyber Security – Produced By Gregory Evans

NSF #investments aim to #address growing #cybersecurity challenge

Today, the National Science Foundation (NSF) announced $74.5 million in funding for foundational research and education that aims to address the growing cybersecurity challenge. This investment, through the NSF Secure and Trustworthy Cyberspace (SaTC) program, is critical to achieving a safe, secure, resilient and trustworthy cyberspace, including associated critical infrastructure such as the energy grid and transportation systems.

“The Secure and Trustworthy Cyberspace program is poised to strengthen our nation’s competitive edge through safer and more secure cyber systems, and to develop the knowledge base that will lead to a well-trained cyber workforce,” said Jim Kurose, NSF assistant director for Computer and Information Science and Engineering (CISE). “Safeguarding cyberspace requires a wealth of expertise from many disciplines, and we are especially excited about the interdisciplinary, highly collaborative nature of this portfolio across a wide range of research areas.”

The SaTC program aims to maximize the growing economic and societal benefits of computing and communication systems by ensuring their security and privacy. While this goal may seem simple at the surface, securing cyber systems and maintaining information privacy has proven quite challenging. The interplay of system vulnerabilities and human behaviors and motivations has resulted in countless instances of attacks, damage and unauthorized access, costing billions of dollars annually in recent years.

“The cutting-edge research in these proposals investigates not only technical solutions to cybersecurity but also the critically important element of people and their behavior,” said Fay Cook, assistant director for Social, Behavioral and Economic Sciences (SBE).

To address this challenge, NSF is issuing 214 awards to researchers to pursue a broad range of research areas, including access control and identity management, cryptography, intrusion detection, human interaction and usability, network topology and other areas. NSF’s SaTC investment spans activities that further foundational research, nurture a capable, next-generation cyber workforce, and accelerate the transition of research innovations to practice and useful products.

This year’s awards build upon a long history of innovations that have resulted from previous NSF funding of cybersecurity and privacy research, including encryption algorithms that form the basis for all electronic commerce; tools that detect software bugs; and methods that enable identification of the technological, economic and social vulnerabilities underlying spam email and other cybercrime.

Among the awards being announced are the following three large projects with budgets ranging from $1.4 million to $3 million each over five years:

  • Viaduct: A Framework for Automatically Synthesizing Cryptographic Protocols, Andrew Myers, Cornell University

This project will explore how to bridge the gap between the security goals of software developers and the lower-level functionality for end users offered by hardware and cryptography protocols.

  • Accountable Information Use: Privacy and Fairness in Decision-Making Systems, Anupam Datta, Carnegie Mellon University

This project is investigating how to ensure data privacy and fairness in automated systems that determine decisions and actions that affect people’s lives.

  • Investigating the Susceptibility of the Internet Topology to Country-level Connectivity Disruption and Manipulation, Amogh Dhamdhere, University of California, San Diego

This project is developing methodologies to identify potential weaknesses in the topology of the internet infrastructure, and to quantify the potential impact if attackers were to compromise these critical elements.

Other awards focus on the cybersecurity workforce, including pilot programs for new instructional materials and professional development for teachers.

Reflecting the interdisciplinary nature of cybersecurity, the SaTC program is led by NSF’s CISE Directorate, in collaboration with the directorates for Education and Human Resources (EHR), Engineering (ENG), Mathematical and Physical Sciences (MPS), and Social, Behavioral and Economic Sciences (SBE).

The program also includes a partnership with the Semiconductor Research Consortium (SRC), focused on the security of hardware systems.

The awards announced today are part of a portfolio of approximately $160 million invested in cybersecurity research and education across the agency in Fiscal Year 2017.

The post NSF #investments aim to #address growing #cybersecurity challenge appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

How to address the changing reality of cybersecurity

Source: National Cyber Security – Produced By Gregory Evans

The issues and challenges around cybersecurity are changing. In the past, cybersecurity models centered on placing a firewall around an enterprise and assuming everything inside that firewall was trustworthy and secure while everything outside of it was part of a malevolent world. With IP technology, the Internet of Things, and…

The post How to address the changing reality of cybersecurity appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Air Force to Implement Cybersecurity Plan Designed to Address Potential Threats

Source: National Cyber Security – Produced By Gregory Evans

The U.S. Air Force will operationalize various elements of its cybersecurity plan which was structured to evaluate and address potential attacks as well as develop cyber resilience in weapons systems and platforms during the acquisition process, Defense Systems reported Friday. The report noted that the service branch will implement various…

The post Air Force to Implement Cybersecurity Plan Designed to Address Potential Threats appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Corvil Develops World’s First Virtual Security Expert to Address Cybersecurity in Financial Markets

Source: National Cyber Security – Produced By Gregory Evans

Corvil Develops World’s First Virtual Security Expert to Address Cybersecurity in Financial Markets

Corvil today announced a cybersecurity solution specifically designed to address the unique security needs of today’s electronic trading businesses looking to solve escalating concerns over cyber attacks while demonstrating compliance with evolving regulations. Powered by sophisticated machine learning algorithms, Corvil “Cara” acts as a virtual security expert that autonomously identifies vulnerabilities and possible attacks within trading environments that often process …

The post Corvil Develops World’s First Virtual Security Expert to Address Cybersecurity in Financial Markets appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Identity-theft expert to address cybersecurity at event in Loveland

cybersecurity-sileo-oct4_-150x150

Source: National Cyber Security – Produced By Gregory Evans

Identity-theft expert to address cybersecurity at event in Loveland

LOVELAND — Nationally recognized speaker John Sileo will deliver the keynote address at “Cybersecurity: Protecting Your Business While Building Trust with Your Customers,” a symposium on identity theft and cybersecurity that will include a panel discussion with industry experts.
The

The post Identity-theft expert to address cybersecurity at event in Loveland appeared first on National Cyber Security.

View full post on National Cyber Security

States Address Dating Violence – Education Week

Legislatures in 21 states sought this year to expand topics in sex education classes, in many cases to address teen dating violence or child sexual abuse, according to a new legislative analysis.

View full post on Education Week: Bullying







#pso #htcs #b4inc

Read More

The post States Address Dating Violence – Education Week appeared first on Parent Security Online.

View full post on Parent Security Online

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.

Source: National Cyber Security – Produced By Gregory Evans

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers.   “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.”   The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director )   “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said.   As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them.   The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan.  IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year.

He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post He is special guest at the Ground Zero Summit 2015 being organised by Indian Infosec Consortium – a group of ethical hackers. “Threat to national security has moved to the digital dimension. Terrorist organisations have turned social networks and online forums into recruitment hotbeds and propaganda mechanisms. We need a security apparatus in the digital space to address this threat. Hackers are the face of this digital army.” The actor said he is bringing his whole team including scriptwriters of the show to observe and interact with the ethical hacker community. (Also Read: Tabu Has Shown Interest in 24, Says Director ) “From November 22, I will start shooting for 24. It will go on air in 2016. When an actor prepares for a role, we often start to live like the character. Some call it method acting. We meet real life people like the character and try to understand their nuances, their life,” he said. As per the summit’s website, speakers will share details of the espionage mission as well as hold sessions on hacking of cellular networks, medical devices in hospitals, using technical loopholes in them. The consortium claims to have discovered cyber espionage operation under which phones of Indian Army personnel, who had downloaded some mobile application related to news, had been compromised by hackers based in Pakistan. IIC CEO Jiten Jain has said that the findings were handed over to security agencies who promptly acted and sanitised the infected handset early this year. appeared first on National Cyber Security.

View full post on National Cyber Security

Police Address Recent String Of Teen Crimes In Sioux Falls

Several recent unrelated crimes in Sioux Falls all have one thing in common — they involved teenagers.

From a string of burglaries to a home invasion, it seems there’s been an uptick in teen crime over the past few weeks.

“I think during the summer we do see a little bit more crime that involves teenagers,” said Officer Sam Clemens, Sioux Falls Police Dept.

There have been three recent serious crimes involving teens.

First, an early morning home invasion in July. Police say five teenagers attempted to rob an apartment on South Louise Avenue for drugs and money.

This case, police say, is eerily similar to the 2013 Jordan Lebeau case, which ended in murder.

Read More

The post Police Address Recent String Of Teen Crimes In Sioux Falls appeared first on Parent Security Online.

View full post on Parent Security Online

4 common but dangerous cyber threats and steps to address them

Source: National Cyber Security – Produced By Gregory Evans

Increased access to the technical tools needed to launch cyber attacks, minimal risk of apprehension and lucrative payouts have created a perverse incentive for criminals to embrace crimes that are cyber-enabled or cyber-dependent. The nature of cyber crimes, the motivation behind them, the targets and the actors are all evolving. The cyber underworld, once dominated by mischievous computer experts, is now attracting financial criminals, hacktivist groups driven by distinct agendas and nation-states—all of which are targeting organizations of all types, small and large alike. The motivation for hacking has gone from exposing a target’s weaknesses to exposing or stealing sensitive data and disrupting critical business processes. At significant cost to corporations and their customers, criminals are netting millions of dollars trading personally identifiable information stolen via data breaches or hacking into corporate networks. Recent industries or sectors that have seen the greatest increase in exposure and claims include healthcare, financial institutions, retail, IT service firms, social media, payroll processors and government agencies. Four common but dangerous cyberattacks face every type of business—including insurance agents and brokers. Here are real-life examples of how the right risk management solution can provide you and your clients with the critical financial protection needed. 1. […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post 4 common but dangerous cyber threats and steps to address them appeared first on National Cyber Security.

View full post on National Cyber Security

Everyday hero or thief? Cyber criminal to address 2012 arrest

Source: National Cyber Security – Produced By Gregory Evans

In 10 days, the doors of San Quentin prison will release one of its most memorable inmates. Scott Lang, former systems engineer at VistaCorp, was arrested three years ago for stealing nearly $4 million from his employer and for a subsequent property damage rampage, which, among other things, claimed the prized Bentley of VistaCorp’s CEO. Lang was given five years in San Quentin, but is being released two years early next week. Since his arrest, Lang has remained adamant about his innocence. According to an official statement, he was only out to expose and correct corrupt activity within the upper echelons of VistaCorp; Lang believed the San Francisco cyber security conglomerate was knowingly overcharging its customers. The details of the heist at least superficially support Lang’s claims. After allegedly reporting the scandal to the police and VistaCorp Human Resources, Lang took matters into his own hands, breaking into the CEO’s house and using an encrypted hardline to siphon funds from VistaCorp servers. Surprisingly, though, instead of pocketing the whole $4 million, Lang used the money to “refund” numerous VistaCorp customers, only leaving himself a small severance package. Shortly after Lang was taken into custody, the SEC launched an investigation of the […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Everyday hero or thief? Cyber criminal to address 2012 arrest appeared first on National Cyber Security.

View full post on National Cyber Security