Tagged: cybersecurity

Cybersecurity image - from CHDS images

Report from the Cyberspace Solarium Commission

Last year, the National Defense Authorization Act created the U.S. Cyberspace Solarium Commission to address the continually evolving cyber landscape and strategic dilemma facing the United States. Specifically, the Commission was asked the two following questions: (1) What strategic approach will defend the United States against cyberattacks of significant consequences?...

Digital depiction of a lock with semiconductor background

2019 Internet Crime Report Released

The Federal Bureau of Investigation’s Internet Crime Complaint Center has released the “2019 Internet Crime Report“, which provides a detailed overview of the 467,361 Internet-facilitated crime complaints issued in 2019. According to the report, complaints were mostly submitted about the following types of crimes: Phishing/Vishing/Smishing/Pharming, Non-Payment/Non-Delivery, Extortion, and Personal Data...

Flag memorial at Ground Zero

National Security Strategy Focuses on Changing Nature of Threats

The Department of Homeland Security released the Strategic Framework for Countering Terrorism and Targeted Violence to address the changing landscape of security challenges to the nation: These threats have become more complex, more interconnected, more intertwined with technological advances, and closer to home. The nation faces a wider variety of...

computer with pirate flag on screen

In Focus: Ransomware

New In Focus now available on Ransomware. From the Cybersecurity and Infrastructure Security Agency (CISA): The Cybersecurity and Infrastructure Security Agency (CISA) has observed an increase in ransomware attacks across the world: See CISA’s Awareness Briefings on Combating Ransomware, Joint Ransomware Statement, and CISA Insights – Ransomware Outbreak. Ransomware is a type of malicious software, or malware,...

Globe connections

Cloud Smart: A New Computing Strategy

The United States office of Management and Budget released a new report titled Federal Cloud Computing Strategy. This report is the product of the Report to the President on Federal IT Modernization and Executive Order 13800, both released in 2017, and the effort to update the Government’s legacy Federal Cloud...

voting stickers

Cyber-Enabled Foreign Interference: A Growing Threat to Western Democracies

Foreign interference and manipulation of information represent the new order of emerging threats to Western democracies. In particular, cyber-enabled interference in elections offers unique opportunities for adversaries to transform public opinions and shape political events. To address these threats, the Australian Strategic Policy Institute released a policy brief, which highlights...

A close up image of a computer screen shows the word Security, and a cursor hovering over it

Disruptive Technology and National Security

Leading technology and cybersecurity experts weigh in on a Department of Defense white paper released this month examining the role of emerging and disruptive technologies on national security. On the Horizon: Security Challenges at the Nexus of State and Non-State Actors and Emerging/Disruptive Technologies, features opening remarks from the Joint...