In-brief: errant reports about a Russian government hack of a Vermont utility are the first byproduct of a flawed report on Russian hacking of U.S. interests. They won’t be the last.
Tag: Policy
Security Pros Pan US Government Report on Russian Hacking
In-brief: security experts say the 13 page report, released Thursday, falls well short of offering conclusive evidence of Russian involvement in the hacking, even as The Obama Administration acts to punish Russia for its involvement.
It’s the Risk, Stupid: FDA Medical Device Guidance Looks Past the Device
In-brief: The FDA’s final guidance on cybersecurity for postmarket medical devicesmarks a departure from earlier drafts, focusing generically on cybersecurity risk management and jettisoning an early focus on the threat posed by “connected devices” that some considered too narrow.
On Capitol Hill: Calls For A Federal Role in Securing World of Dangerous Things
Some of the nation’s top experts on cyber security and the Internet of Things urged Congress to take a more forceful approach to securing a burgeoning population of Internet connected devices before security and quality issues undermine consumer confidence. Members of the House Committee on Energy and Commerce were told in separate testimony that security problems such as the recent denial of service attacks linked to the Mirai botnet will become more common and could threaten the integrity of the Internet and of the nation’s broader economy if left unaddressed. The Committee heard from Dr. Kevin Fu of the University of Michigan, Bruce Schneier of IBM and a fellow at Harvard’s Kennedy School of Government and Dale Drew, the Chief Security Officer of Level3 Communications. All three, to varying degrees, advised a bigger government role in setting standards for devices connected to the Internet. And all three warned that a failure to […]
Can Low-Power Devices Be Secured? | Semiconductor Engineering
In-brief: Internet of Things will break the traditional perimeter-based model for security, and article at Semiconductor Engineering declares. But are device makers ready to do what’s necessary to build a new generation of secure endpoints that can scale globally?