What is TLS 1.3 (and why one security pro says it’s not quantum-safe)
Quoted in the article.
With a June 6 executive order, President Trump took a Sharpie to parts of President Biden’s final cybersecurity directive, including guidance related to post-quantum cryptography (PQC)—a defense against the super-fast machines that could someday break many of today’s message scramblers.
Space assets could be held ransom. Will we have any choice but to pay?
Ransomware exploits value. Attackers put victims against a decision to pay for the hope of the return of their system or lose it. For victims, it is hard to justify not paying even though it sets a harmful precedent. At heart, this is an economics question that cyber professionals find it difficult to answer on Earth. In space, the steep initial investments, slow times to market and operational costs of satellites and in-orbit infrastructure make the payment of a future ransomware attack against a satellite nearly assured.
NIST loses key cyber experts in standards and research
Quoted in the article
The head of the agency’s Computer Security Division and roughly a dozen of his subordinates took the Trump administration’s retirement offers, placing key programs at risk. The departures are raising concerns over NIST’s work on emerging technology issues in quantum computing and artificial intelligence.
Barclay Damon Cyber Sip Podcast: Yes, You Can - But Should You? Strategies for Implementing Generative AI
Podcast
The conversation emphasizes the significance of understanding data security, the role of human oversight, and the establishment of AI governance to ensure ethical and effective implementation of AI solutions.
Why the Signal chat leak might have exposed a big legal problem for Trump administration
Quoted in the article.
Lawmakers and legal experts claim the Yemen Signal group chat ‘blatantly violated security regulations designed to prevent exactly this kind of leak’
Elon Musk Points Finger at Ukraine for Cyber Attack on X That Caused Major Outages
Quoted in the article.
Elon Musk has pointed the finger at Ukraine for a major cyber attack on X (formerly Twitter), that caused outages throughout Monday.
Tens of thousands of users reported at least three major outages of the website and app.
What President Biden’s second cybersecurity executive order means for the space economy
In the waning hours of the Biden administration, the Executive Order on Strengthening and Promoting Innovation in the Nation’s Cybersecurity, was released. The order is a sweeping opus that covers a variety of topics from space cybersecurity to post-quantum cryptography.
Attack season
This post explores how a cyberattack against Smart Agriculture systems in strategic areas can cause significant economic, food security, and public trust issues if timed correctly. This outline provides specific guidance for cybersecurity officials in communities with Smart Agriculture to focus on their vulnerabilities and the right time of year when a cyberattack would have maximum impact.
More Spyware, Fewer Rules: What Trump’s Return Means for US Cybersecurity
Quoted in the article.
Experts expect Donald Trump’s next administration to relax cybersecurity rules on businesses, abandon concerns around human rights, and take an aggressive stance against the cyber armies of US adversaries.
Municipal Chaos: How Chaos Theory Explains Cyberattacks Against Smart City Architectures
When a linear act leads to non-linear results, it’s chaos. That’s not a figure of speech. Non-linear behaviors that result from an otherwise linear and deterministic system underpin chaos theory, a fascinating branch of mathematics and life sciences that results in amazing insights into our world. It shows how tiny actions in an otherwise linear system can cause dramatic effects and even outcomes that we cannot otherwise predict.
CNBC: Connecting your phone to rental car infotainment system? There is a big, hidden privacy risk
Quoted in the article.
Syncing your mobile device to a rental car’s infotainment system is an often overlooked security risk that can be avoided, and car rental companies like Avis and Enterprise place the legal responsibility on the customer.
Riskgaming Podcast: The how and why of the most successful supply-chain attack in history
The recent supply-chain attack on Hezbollah exemplifies the evolving nature of threats, integrating technology to cause physical harm rather than mere cyber intrusion. Emerging technologies and public-private partnerships are crucial for addressing national security challenges and enhancing the resilience of supply chains against sophisticated attacks
Daily Mail: Crowdstrike Outage Analysis
Quoted in the article
How a cybersecurity attack would cripple America - after catastrophic Crowdsource glitch.
Technopedia: Crowdstrike Outage Analysis
Quoted in the article.
The familiar blue screen of death (BSOD) wasn’t just a personal annoyance last week – it was a global wake-up call.
CNBC: The CrowdStrike Fail
Quoted in the article
The CrowdStrike fail and next global IT meltdown already in the making
Simply Trade Podcast: New Strategies to Secure Ports from Cyber Attacks
As global trade increases, so do cyber threats to the maritime industry. Learn how ports, ships, and supply chains are vulnerable - and what's being done to secure this critical infrastructure.
Privacy Luxury?
We’ve all been there. You board a plane for a long flight, and in an annoyingly genius bit of marketing, the airline ensures they walk you right past the business class seats so you can see how comfortable you COULD be.
The Future of Convergence: Quantum, 6G, and Prix-Fixe Menus
We’ve been on a culinary odyssey together as we’ve explored connected communities, technology convergence, and a buffet of delicious delights. For the last installment of this series, we will talk about the future of technology convergence in the municipal environment.
A Call for Municipal IoT Interoperability Standards: Security, Binding Agents, and Towers of Baked Goods
Municipal IoT needs a protocol standard that enables interoperability in connected community architectures.