MADISON – With his proposed cuts in federal research and development spending, President Trump risks harming a priority he puts at the top of his own list – national security.
The history of federal investment in R&D, especially since the end of World War II, reflects a bipartisan consensus that money spent on basic and applied research pays economic and security dividends over the long haul while helping the nation respond to short-term crisis.
Wikileaks’ CIA dump is the biggest secret cache released so far. It’s embarrassing to the CIA. It undermines our intelligence efforts. And it didn’t need to happen.
The sad fact is that the world’s computers are not configured securely enough to match the confidentiality of the data they are protecting. As a society we allow our computers to languish in a state that almost invites attackers to access them—even at the CIA, apparently.
WikiLeaks this week published a trove of documents that appears to detail how the Central Intelligence Agency successfully hacked a wide variety of tech products, including iPhones, Android devices, Wi-Fi routers and Samsung televisions.
AWS operations explains that it was tougher to restart its S3 index system this time than the last time they tried to restart it.
The Feb. 28 outage of Amazon’s Simple Storage Service says one thing loudly and clearly: Amazon Web Services is growing so fast that it must rely on its automated systems to keep operating. Sometimes things need to go awry in only a minor way, and the sheer scale involved puts those systems at risk of disabling it.
Cybersecurity incidents continue to grow in both volume and sophistication, with 64 percent more security incidents reported in 2015 than in 2014, according to a June 2016 report by the Ponemon Institute. The human instinct is to try to find those responsible. However, any attempt to access, damage, or impair another system that appears to be involved in an attack is mostly likely illegal and can result in civil and/or criminal liability. Since many intrusions and attacks are launched from compromised systems, there’s also the danger of damaging an innocent victim’s system.
Only 29% of US businesses have cyber insurance; Deloitte outlines steps for insurance companies to improve risk models, communication, and policy sales.
Sales of cyber insurance policies are suffering from a lack of shared data about security incidents, too few standard definitions, and not enough focus on risk mitigation for insurers or customers, according to a report from Deloitte released this week.
Viewed from afar these days, it might be easy to conclude that life in Washington, D.C., has become a reality show gone awry.
Cabinet-level nominees stepping down amid claims of wrongdoing; a president seemingly at war with the press and members of his own team; an intelligence community at odds with the source of its authority; and a bureaucratic “swamp” that refuses to be drained.
Not to be overlooked, however, are the real issues facing Congress, the White House and the nation as the hard work of governing marches on.
Called the “largest interconnected machine,” the U.S. electricity grid is a complex digital and physical system crucial to life and commerce in this country. Today, it is made up of more than 7,000 power plants, 55,000 substations, 160,000 miles of high-voltage transmission lines and millions of miles of low-voltage distribution lines. This web of generators, substations and power lines is organized into three major interconnections, operated by 66 balancing authorities and 3,000 different utilities. That’s a lot of power, and many possible vulnerabilities.
I recently returned from a vacation to find that Google’s algorithms had created a customized slide show of my trip. I hadn’t asked for one. But the company’s software robots apparently noticed I’d traveled somewhere and taken a flurry of photos, which likely indicated I’d been vacationing. Now, I actually enjoy some of Google’s simpler customization tools, like autocomplete. But this unbidden slide-show curation seemed too humanlike. The machine had anticipated desires I didn’t have yet. I actually yelped when I saw it.