Tagged: cyber

The logo of DARPA - Defense Advanced Research Projects Agency

DARPA Wants to Prevent Your Car from Killing You

DARPA’s Cyber Grand Challenge (CGC) aims to turn zero-day exploits into zero-second exploits with computers that detect and fix security gaps before they can be widely exploited by troublemakers. It’s not just important for securing sensitive information, it could save lives. In May of 2015, a simple text message (effective....

Cyber Disruption is Inevitable, but Resistance is Not Futile

The National Association of State Chief Information Officers (NASCIO) has released a 104-page Cyber Disruption Response Planning Guide. “This guide is both a practical implementation document and a call to action for states to develop state cyber disruption response plans that include: a governance structure that clearly designates who is...

DHS Cyber Incident Data and Analysis Working Group

Cybersecurity continues to emerge as a crucial endeavor for both the public and private sectors alike. In an attempt to address cyber threats, the Department of Homeland Security (DHS) organized four separate Cybersecurity Insurance Working Sessions between 2012-2014, where cybersecurity professionals “examined the existing cybersecurity insurance marketplace, described obstacles to...

Protecting U.S. Interests in the Cyber Realm

It is difficult to keep track of the rate at which our environment is becoming interconnected. For example, modern car tires can now relay air-pressure to dashboard displays or smartphones via bluetooth technology. Innovation at such a rapid rate can drastically increase efficiency, but likewise it can also expose vulnerabilities....

Cyber Attacks Take Flight

As technology becomes more prevalent and convoluted in American society, responses by the Department of Homeland Security (DHS) must adapt to the ever-changing threat of cyber attacks.  In the wake of the Sony breach by North Korea and the Islamic State (IS) hack of the Centcom twitter feed, awareness of...

From the Boston Marathon to the Islamic State: Countering Violent Extremism (CVE)

The Washington Institute for Near East Policy’s counterterrorism lecture series has organized numerous discussions focused on terrorism as a critical factor shaping and affecting U.S. Middle East policy. Since its inception in December 2007, the Institute’s lecture series has featured numerous officials from a diverse assortment of government agencies providing...

Analyzing China’s Cybersecurity Strategy

“Efforts should be made to build our country into a network powerhouse“ -Chinese President Xi Jinping As the effects of globalization have spread, the amount of information stored on digital networks has simultaneously increased. A subsequent bi-product has been developing strategies to protect this information, or “Cybersecurity.” The Center for...

Power Grid Needs a Cybersecurity Boost: Bipartisan Policy Center Report Finds Weaknesses in U.S. Critical Infrastructure Protection

In February, the Co-chairs of the Bipartisan Policy Center’s Electric Grid Cybersecurity Initiative, together with the National Homeland Security Project, published a report of findings on the security status of the nation’s electricity infrastructure. Protecting this power grid from cyber attacks is critical to national security in an environment where...

Federal Government’s Track Record on Cybersecurity and Critical Infrastructure

The Senate Committee on Homeland Security and Governmental Affairs released today a new report that outlines the recent failures of the federal government to prevent cyberattacks on the nation’s critical infrastructure. The report, “The Federal Government’s Track Record on Cybersecurity and Critical Infrastructure”, looks into the cyber vulnerabilities of six...