Elon Musk Points Finger at Ukraine for Cyber Attack on X That Caused Major Outages
Quoted in the article.
Elon Musk has pointed the finger at Ukraine for a major cyber attack on X (formerly Twitter), that caused outages throughout Monday.
Tens of thousands of users reported at least three major outages of the website and app.
Companies are planning to build space critical infrastructure. Can space policy keep up?
Building space policy is hard enough. It’s harder when trying to make a future-focused policy decision based on abstract concepts. That’s really the problem with the space critical infrastructure conversation, isn’t it? When we talk about space services, we look at what we know, which is low Earth orbit (LEO), and services provided from LEO assets to Earth. We talk considerably less about cislunar travel or interplanetary travel even though there are plans for both in the less than distant future. The difference is that one is real today and one is abstract.
What President Biden’s second cybersecurity executive order means for the space economy
In the waning hours of the Biden administration, the Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity, was released. The order is a sweeping opus that covers a variety of topics from space cybersecurity to post-quantum cryptography.
Attack season
This post explores how a cyberattack against Smart Agriculture systems in strategic areas can cause significant economic, food security, and public trust issues if timed correctly. This outline provides specific guidance for cybersecurity officials in communities with Smart Agriculture to focus on their vulnerabilities and the right time of year when a cyberattack would have maximum impact.
Riskgaming Podcast: The how and why of the most successful supply-chain attack in history
The recent supply-chain attack on Hezbollah exemplifies the evolving nature of threats, integrating technology to cause physical harm rather than mere cyber intrusion. Emerging technologies and public-private partnerships are crucial for addressing national security challenges and enhancing the resilience of supply chains against sophisticated attacks
Simply Trade Podcast: New Strategies to Secure Ports from Cyber Attacks
As global trade increases, so do cyber threats to the maritime industry. Learn how ports, ships, and supply chains are vulnerable - and what's being done to secure this critical infrastructure.
Privacy Luxury?
We’ve all been there. You board a plane for a long flight, and in an annoyingly genius bit of marketing, the airline ensures they walk you right past the business class seats so you can see how comfortable you COULD be.
Space ISAC Conducts Successful TTX at CYSAT Conference
Quoted in the article.
Space Information Sharing and Analysis Center (Space ISAC) is pleased to announce the successful execution of a dynamic Tabletop Exercise named “Saving Selene: Walking on the Moon” during the 2024 CYSAT conference in Paris, marking a significant milestone in proactive space security initiatives.
The Future of Convergence: Quantum, 6G, and Prix-Fixe Menus
We’ve been on a culinary odyssey together as we’ve explored connected communities, technology convergence, and a buffet of delicious delights. For the last installment of this series, we will talk about the future of technology convergence in the municipal environment.
Digital Leader Show Podcast: AI Governance, Staying Ahead of the Compliance Curve in 2024
On this episode of The Digital Leader Show we are discussing AI Governance & Staying Ahead of the Compliance Curve in 2024, with the Department of Homeland Security's former Director of Emerging Technology Policy Nick Reese and past FDIC Chief Innovation Officer Sultan Meghji...PLUS, headlines for digital leaders from the world of enterprise technology.
Complexity on Complexity: Connected Communities, Critical Infrastructure, and Refreshing Salads
Much like how a combination of ostensibly unrelated ingredients can result in a delicious salad, U.S. critical infrastructure coalesces disparate parts to form the public services and functions that we have come to rely on.
Converging on an Understanding: Emerging Tech, Our Communities & Delicious Desserts
Any conversation about the concept of convergence should start in the logical place: chocolate and peanut butter. Convergence is when two (or more) things layered together create a capability that is greater than the individual components.
CONVERGENCE OF MISSION AND MOMENT: IMAGINING THE EMERGING TECHNOLOGY ANALYST
The Department of Homeland Security (DHS) was born in a different time. One year, two months, and twenty-four days after the attack on the World Trade Center, Pentagon, and United Flight 93, DHS was born. The Homeland Security Act was signed on November 25, 2002, and carried with it fresh and open wounds from the horrifying attack just over a year past.
ABA Section of Civil Rights & Social Justice webinar: Zero Sum Game? Developing a Winning Approach to Privacy and Security in an Age of Zero Trust
Security and privacy are two sides of the same coin – it’s hard to have one without the other. Yet there can be a tension between them. Strong legal and technological protections, including encryption, are necessary to effectively protect private data and communications. Yet terrorists, smugglers of dangerous weapons and drugs, human traffickers, and perpetrators of child sexual abuse material (CSAM) sometimes use end-to-end encrypted messaging (E2EE) to prevent their crimes from being discovered by law enforcement. Proposed U.S. laws such as the EARN IT Act seek to end E2EE messaging so that law enforcement need not fear criminals "going dark."