cybersecurity
See the following -
The White House Big Data Report: The Good, The Bad, And The Missing
Last week, the White House released its report on big data and its privacy implications, the result of a 90-day study commissioned by President Obama during his January 17 speech on NSA surveillance reforms. Now that we’ve had a chance to read the report we’d like to share our thoughts on what we liked, what we didn’t, and what we thought was missing...
- Login to post comments
The Worst Possible Cybersecurity Breaches Could Be Far Worse Than You Imagined
The cyber-ruffians who briefly tanked the stock market recently by faking a news tweet about an attack at the White House showed how much damage can be done with a few well-placed keystrokes... Read More »
- Login to post comments
Tidelift Introduces a Comprehensive Way for Organizations to Ensure the Health of their Open Source Supply Chain
Tidelift, the premier provider of solutions for managing the open source software behind modern applications, today announced the general availability of Tidelift catalogs, an innovative way to ensure organizations can consistently manage the health and security of their open source software supply chain. "As software supply chain security makes front page news in 2021, it is more important than ever that application development teams employ a comprehensive approach to managing the open source components that make up their applications," said Donald Fischer, CEO and co-founder, Tidelift. "With the addition of catalogs to the Tidelift Subscription, organizations can be confident that they are using open source safely without slowing down development."
- Login to post comments
TIM Review’s Evolution from Ottawa Journal to International Resource
From its humble beginnings as the Open Source Business Resource to its status today as an internationally acclaimed journal for academics and businesspeople alike, the Technology Innovation Management Review has made its name on staying ahead of the curve. Tony Bailetti, director of Carleton University’s TIM program, launched the journal back in 2007. At the time, it was an experiment to uncover how business owners might make use of open-source applications...
- Login to post comments
Time To Deliver On Federal IT Reform
First four years of the Obama Administration were marked by the beginnings of significant changes in federal IT. Execution will be the name of the game during the next four. Read More »
- Login to post comments
Tractor Owners Using Pirated Firmware To Dodge John Deere's Ham-Fisted Attempt To Monopolize Repair
We've been noting for a while how numerous states have been pushing so-called "right to repair" bills, which would make it easier for consumers to repair their own products and find replacement parts and tools. Not surprisingly, many tech companies have been working overtime to kill these bills. That includes Apple, which recently proclaimed that Nebraska's right to repair bill would turn the state into a nefarious playground for hackers. Opposition also includes Sony and Microsoft, which both tend to enjoy a repair monopoly on their respective video game consoles...
- Login to post comments
Trove Of Medical Devices Found To Have Password Problems
Surgical devices, ventilators, defibrillators, and monitors are among the equipment at risk. Read More »
- Login to post comments
U.S. Department of Homeland Security Warns of Cybersecurity Issues with Those Using Pyxis SupplyStation
Flaws within more that 1,4oo cybersecurity third-party software have been found by the U.S. Homeland Security department that are used with Pyxis SupplyStation automated medical supply cabinet. Pyxis’ medical supply cabinet is made by Becton Dickinson & Co. subsidiary CareFusion...
- Login to post comments
U.S. Department of Veteran Affairs and UL Sign CRADA for Medical Devices Cybersecurity Standards
The U.S. Department of Veteran Affairs (VA) and UL (Underwriters Laboratories), a global safety science organization, today announced a signed Cooperative Research and Development Agreement Program (CRADA) for medical devices cybersecurity standards and certification approaches. As part of the Federal Technology Transfer Act of 1986, the CRADA mechanism was established to encourage the creation of teams to solve technological and industrial problems for the greater benefit of the country...
- Login to post comments
U.S. Government Probes Medical Devices For Possible Cyber Flaws
The U.S. Department of Homeland Security is investigating about two dozen cases of suspected cybersecurity flaws in medical devices and hospital equipment that officials fear could be exploited by hackers, a senior official at the agency told Reuters...
- Login to post comments
U.S. Government Seeks Reduced Use of Custom Software, Releases New Policy to 'Free the Code'
As I've written before, there has been a shift, going back almost a decade, away from the debate over whether to use open source to a focus on the how to. The release by the Office of Management and Budget (OMB) of the U.S. Federal Source Code Policy on August 8th is the latest manifestation of this shift. It achieves the goal laid out in the Obama administration's Second Open Government National Action Plan (PDF) for improved access to custom software code developed for the federal government. The plan emphasized use of (and contributing back to) open source software to fuel innovation, lower costs, and benefit the public. It also furthers a long-standing "default to open" objective going back to the early days of the administration...
- Login to post comments
Ukrainian Power Grid Hack: What Happened and What Needs to Change?
The Ukrainian power grid hack that reportedly left 700,000 homes in the dark just before Christmas highlights how the critical infrastructure sectors must step up to the plate and work harder to keep the bad guys out. It is a safe bet that few industrial control systems (ICS) critical infrastructure organizations would rate their cybersecurity as excellent. If they know this, the hackers do too and that makes them an easy target...
- Login to post comments
US Won't Reveal Records On Health Website Security
After promising not to withhold government information over "speculative or abstract fears," the Obama administration has concluded it will not publicly disclose federal records that could shed light on the security of the government's health care website because doing so could "potentially" allow hackers to break in...
- Login to post comments
USPS Breach Wider Than First Reported
Social Security numbers of U.S. Postal Service employees weren't the only data to be affected in September's cybersecurity breach at USPS. The agency is now saying that the medical records of as many as 485,000 employees might also have been accessed...
- Login to post comments
VA Tackles Medical Device Vulnerabilities and Cyberthreats
VA recently signed partnerships with Massachusetts General Hospital and Shepherd University. This collaboration's research will address cybersecurity and compatibility measures needed in devices used for VA patient care. It will also refine existing and emerging cybersecurity standards and practices for network connectable medical devices, medical data systems and other related technology. Beyond VA, the agreements could have a broad impact in standardizing cybersecurity and safety requirements within the larger public health sector. VA is contributing to industry-wide awareness of both medical device vulnerabilities and threats, while applying further tests of the Underwriters Laboratories criteria and other emerging standards.
- Login to post comments