In response to the increase in cyber threats' frequency and complexity, a new report makes 11 recommendations for shoring up security while protecting privacy through information sharing.
While a reported cyber attack on a German industrial plant last year may not have risen to the level that the damaging Stuxnet computer worm could have inflicted, a well-regarded Washington, D.C., cybersecurity expert said it was pretty close.
The massive, monolithic technology platforms upon which U.S. defense systems rely are inflexible, increasingly difficult to manage and hostile to advances in technology, said the director of the Defense Advanced Research Projects Agency. They're also vulnerable to malicious actors, said DARPA Director Arati Prabhakar during a Nov. 12 event hosted by the Center for Strategic and International Studies.
More than 98 percent of mobile cyber threats target Android mobile device users, with about 175,000 new unique malicious programs detected in the first half of 2014 alone, according to a new joint Kaspersky Lab and Interpol report released Oct. 6.
Representatives from 175 countries will discuss topics such as Internet governance, online security and privacy, and the Internet of Things, as the United Nations' International Telecommunications Union, or ITU, kicked off three weeks of meetings Oct. 20 in Busan, South Korea.
Homeland Security Secretary Jeh Johnson said he's worried about foreign fighters, who go overseas to join terrorist groups, learn how to fight and return to carry out potential attacks, as well as the domestic-based "lone wolf" attacks inspired by such groups.
Federal regulatory agencies are taking on a greater advisory role in helping critical infrastructure and financial services companies apply the National Institute of Standards and Technology's cybersecurity framework and reduce their cyber risks, several experts recently said.
When companies break their promises to keep consumer data secure or private, the Federal Trade Commission can bring legal action against them. Now, the agency is extending this practice to mobile applications.
Another wave of unaccompanied minors crossing the border into the United States from Central America is likely to occur before long, an expert on Central America and organized crime said Sept. 12 at the Center for Strategic and International Studies.
The former U.S. ambassador to Iraq said June 19 that the U.S. response to the crisis in Iraq needs to include an emphasis on building relationships with local leaders.