NIST

NIST Framework Tackles Cyber Physical Security

In-brief: the National Institute of Standards and Technology (NIST) has released a draft framework to help manufacturers create cyber physical systems that can interact with other applications and systems securely.

Internet of Tattoos? NIST Workshop Plumbs Body Art Algorithms

In-brief: One in five adults in the U.S. sport body art, making tattoos a useful tool for identifying both criminals and their victims. A NIST workshop explored ways to use AI to better identify and catalog tatts. 

MIT Does Full Court Press on Cybersecurity Research

In-brief: MIT, the East Coast’s leading technical university, will announce three, major cyber security initiatives aimed at web-based security, critical infrastructure and cyber policy. 

Sabotaging Encryption Software – The Perfect Crime?

  In-brief: A report from Bruce Schneier and researchers at the Universities of Wisconsin and Washington surveys the (many) ways that cryptographic protections can be weakened or subverted, and calls for research on fool-proof technologies. 

Senator Warns of DHS Struggle with Cyber Security

U.S. Senator Tom Coburn (R-OK) used his final days in office to warn that the U.S. Department of Homeland Security (DHS) is struggling to fulfill its mission to protect the nation from cyber attack. The report, “A Review of the Department of Homeland Security’s Missions and Performance,” (PDF) was released on Saturday, as the retiring Senator from Oklahoma was leaving office. In it, the outgoing Senator said that DHS’s strategy and programs “are unlikely to protect us from the adversaries that pose the greatest cybersecurity threat.” The warnings on DHS cyber operations were part of a larger critique of the Department in the report, in which Coburn called on reforms of Homeland Security focused on accountability and streamlining. Despite spending $700 million annually on a range of cybersecurity programs, Coburn said it is hard to know whether the Department’s efforts to assist the private sector in identifying, mitigating or remediating cyber […]