cybersecurity
See the following -
FDA Offers Final Guidance For Medical Device Cybersecurity
The U.S. Food and Drug Administration posted newly-minted recommendations for protecting medical devices from attackers...
- Login to post comments
FDA Partners with Sensato-ISAO and H-ISAC to Create Open Source Cybersecurity Intelligence Network and Resource
The United States Food and Drug Administration (FDA) Center for Devices and Radiological Health (CDRH) has officially executed a tri-lateral agreement between the FDA, the Health Information Sharing and Analysis Center (H-ISAC) and the Sensato-Information Sharing and Analysis Organization (Sensato-ISAO), Sensato announced today. The goal of the agreement is "to ensure that essential medical device or healthcare cybersecurity vulnerability information can be shared with all stakeholders within the HPH Sector, including those who are not members of H-ISAC and Sensato-ISAO," according to a statement from the FDA. "This collaboration will help inform a common understanding of that risk threshold upon which exploit of a vulnerability might impact on patient safety and/or public health."
- Login to post comments
Federal CIO On Adopting Emerging Technologies
U.S. Federal Chief Information Officer Steven VanRoekel says he likes to make this point in his speeches: "The securest data center is the one that's unplugged from the network, but that's not going to get you the service that you need." Read More »
- Login to post comments
Federal CIO Outlines Next Steps
With Obama's first term in the rearview mirror, federal CIO Steven VanRoekel is looking for ways to continue to improve federal IT even in the face of looming budget cuts. Read More »
- Login to post comments
Federal CIO Outlines Second-Term IT Priorities
Amid continued cost cutting, the White House will seek to drive innovation, ROI and cybersecurity. Read More »
- Login to post comments
Federal IT Budget To Increase In 2014
Federal IT spending will increase nearly 2%, to $82 billion, in the fiscal 2014 budget submitted by the White House on Wednesday. It's the first significant increase in federal IT spending in four years. Read More »
- Login to post comments
Feds Investigating Two Dozen Potential Hacks Targeting Life-Saving Medical Devices
A senior official at the Department of Homeland Security tells Reuters that government experts are now investigating upwards of two dozen instances in which high-tech medical products may be prone to hackers...
- Login to post comments
Feds Need to Start Thinking Like Hackers
The government should and will continue to invest billions of dollars annually in protecting federal networks, despite economic uncertainty, according to administration officials. Maybe even because of economic uncertainty, funding will be retained. Read More »
- Login to post comments
Feds Not Authorized to Deal with Electric Grid Disruptions
The federal government does not have the legal authority to contain computer network meltdowns capable of roiling society and will not obtain that power until at least 2013, said a cybersecurity researcher who advises Congress and the Obama administration.
- Login to post comments
Five Critical Cyber Questions For The Next DHS Chief
Homeland Security Secretary Janet Napolitano's announcement today that she plans to leave the department raises interesting questions for what is next for the government's cybersecurity efforts. Read More »
- Login to post comments
Forced Exposure
The owner of Lavabit tells us that he's stopped using email and if we knew what he knew, we'd stop too. There is no way to do Groklaw without email. Therein lies the conundrum. What to do? Read More »
- Login to post comments
Forget The Sony Hack, This Could Be The Biggest Cyber Attack Of 2015
...[A]ccording to cyber-security professionals, the Sony hack may be a prelude to a cyber attack on United States infrastructure that could occur in 2015, as a result of a very different, self-inflicted document dump from the Department of Homeland Security in July...
- Login to post comments
Global Group Communication and Culture Tips
If open source needed a new slogan it whould be: Think Globally, Act Globally. Probably with a semicolon instead of a comma, but what slogan uses a semicolon? A semicolon is slogan poison. Just like thinking locally is open source poison. The thing is, when you create a tool you need and decide to throw a Creative Commons license on it to allow others to add to it or make fun of your lousy source code, you can't be thinking locally. You know that it will now reach anywhere and everywhere. And, if you didn't realize that, then you're probably on a different Internet than me...
- Login to post comments
Groups Warn of Privacy Concerns in Cybersecurity Bills
Civil liberties groups are on the Hill Thursday to warn of the dangers they say cybersecurity proposals could pose to privacy and other civil rights.
The Senate is expected to introduce comprehensive cybersecurity legislation any day and the House has moved forward with several bills designed to increase information sharing between the government and private companies. Read More »
- Login to post comments
Guardtime Secures Over a Million Estonian Healthcare Records on the Blockchain
Guardtime, a cyber-security provider that uses blockchain systems to ensure the integrity of data, is partnering with the Estonian e-Health Authority to secure over a million health care records. Guardtime uses Keyless Signature Infrastructure (KSI), a blockchain technology that provides massive-scale data authentication without reliance on centralised trust authorities. Unlike traditional approaches that depend on asymmetric key cryptography, KSI uses only hash-function cryptography, allowing verification to rely only on the security of hash functions and the availability of a public ledger...
- Login to post comments