What is TLS 1.3 (and why one security pro says it’s not quantum-safe)
Quoted in the article.
With a June 6 executive order, President Trump took a Sharpie to parts of President Biden’s final cybersecurity directive, including guidance related to post-quantum cryptography (PQC)—a defense against the super-fast machines that could someday break many of today’s message scramblers.
Emerging Technology in the Energy Sector:Threats, Vulnerabilities, and Recommendations for Industry
Emerging technologies are reshaping the energy sector, presenting both opportunities and significant security challenges. This paper investigates the transformative potential of quantum computing and artificial intelligence (AI) in areas such as grid management, operational efficiency, and predictive maintenance while highlighting the vulnerabilities they introduce
Space assets could be held ransom. Will we have any choice but to pay?
Ransomware exploits value. Attackers put victims against a decision to pay for the hope of the return of their system or lose it. For victims, it is hard to justify not paying even though it sets a harmful precedent. At heart, this is an economics question that cyber professionals find it difficult to answer on Earth. In space, the steep initial investments, slow times to market and operational costs of satellites and in-orbit infrastructure make the payment of a future ransomware attack against a satellite nearly assured.
NIST loses key cyber experts in standards and research
Quoted in the article
The head of the agency’s Computer Security Division and roughly a dozen of his subordinates took the Trump administration’s retirement offers, placing key programs at risk. The departures are raising concerns over NIST’s work on emerging technology issues in quantum computing and artificial intelligence.
Barclay Damon Cyber Sip Podcast: Yes, You Can - But Should You? Strategies for Implementing Generative AI
Podcast
The conversation emphasizes the significance of understanding data security, the role of human oversight, and the establishment of AI governance to ensure ethical and effective implementation of AI solutions.
Companies are planning to build space critical infrastructure. Can space policy keep up?
Building space policy is hard enough. It’s harder when trying to make a future-focused policy decision based on abstract concepts. That’s really the problem with the space critical infrastructure conversation, isn’t it? When we talk about space services, we look at what we know, which is low Earth orbit (LEO), and services provided from LEO assets to Earth. We talk considerably less about cislunar travel or interplanetary travel even though there are plans for both in the less than distant future. The difference is that one is real today and one is abstract.
What President Biden’s second cybersecurity executive order means for the space economy
In the waning hours of the Biden administration, the Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity, was released. The order is a sweeping opus that covers a variety of topics from space cybersecurity to post-quantum cryptography.
Daily Mail: Crowdstrike Outage Analysis
Quoted in the article
How a cybersecurity attack would cripple America - after catastrophic Crowdsource glitch.
Technopedia: Crowdstrike Outage Analysis
Quoted in the article.
The familiar blue screen of death (BSOD) wasn’t just a personal annoyance last week – it was a global wake-up call.
CNBC: The CrowdStrike Fail
Quoted in the article
The CrowdStrike fail and next global IT meltdown already in the making
Simply Trade Podcast: New Strategies to Secure Ports from Cyber Attacks
As global trade increases, so do cyber threats to the maritime industry. Learn how ports, ships, and supply chains are vulnerable - and what's being done to secure this critical infrastructure.
Space ISAC Conducts Successful TTX at CYSAT Conference
Quoted in the article.
Space Information Sharing and Analysis Center (Space ISAC) is pleased to announce the successful execution of a dynamic Tabletop Exercise named “Saving Selene: Walking on the Moon” during the 2024 CYSAT conference in Paris, marking a significant milestone in proactive space security initiatives.
George Washington University Professionals Podcast: Insights from a Homeland Security Expert
In this episode of The Professionals Podcast, Amanda and Luke are joined by Nick Reese, co-founder of Frontier Foundry, which is a leading DC area AI company. Drawing from Nick's experience as a former DHS Cyber Policy Analyst and a co-founder of Frontier Foundry, the Nick shares insights into shaping Executive Order 13960 on AI and underscores the importance of bridging the gap between policy and emerging technologies.
ABA Section of Civil Rights & Social Justice webinar: Zero Sum Game? Developing a Winning Approach to Privacy and Security in an Age of Zero Trust
Security and privacy are two sides of the same coin – it’s hard to have one without the other. Yet there can be a tension between them. Strong legal and technological protections, including encryption, are necessary to effectively protect private data and communications. Yet terrorists, smugglers of dangerous weapons and drugs, human traffickers, and perpetrators of child sexual abuse material (CSAM) sometimes use end-to-end encrypted messaging (E2EE) to prevent their crimes from being discovered by law enforcement. Proposed U.S. laws such as the EARN IT Act seek to end E2EE messaging so that law enforcement need not fear criminals "going dark."