While remaining incognito was once vital for hackers, many are now going public, per outed hackers who spoke at the recent Defcon, a hacking convention. Aliases are still important, but revealing themselves helps hackers use their experience to land high-level cybersecurity gigs.
Smart city technology should be implemented to address citizen needs, whether that be access to reliable transportation or building trust in the government, Philadelphia Chief Information Officer Mark Wheeler says. "In communities that have problems getting licenses, or accessing 911, we can be intentional about the fact that we're trying to respond to their needs as best we can," he adds.
5G networking is expected to make waves in the industry, but 62% of executives say uncertain benefits of the technology pose a barrier to widespread adoption in enterprises, according to an Ericsson survey. Companies preparing for 5G should have plans for short- and long-term development that be adapted as new devices and equipment become available, says Accenture Strategy's Jefferson Wang.
London, Singapore, New York and Boston are among the best cities to make the switch to become smart cities, according to a report from the Eden Strategy Institute, but smaller US cities also plan to introduce artificial intelligence. These cities all must consider the policies, logistics and infrastructure that come with such innovation, Llewellyn King writes.
Politicians and national infrastructure systems are being targeted more with distributed-denial-of-service attacks. In a new survey, IT departments reported 7.5 million DDoS attacks in 2017, a result of more sophisticated tools that are better able to bypass detection.
A team of Berkeley-area Department of Energy researchers is using low-cost security sensors to help track electric grid activity. The monitoring system augments more expensive sensors used on main grids to better detect potential cyberattacks.
Microsoft confirmed a bug in May but failed to fix it before a 120-day deadline. A patch is expected in October, but meanwhile, the bug -- which resides in Microsoft Jet Database Engine -- could allow remote attacks on vulnerable systems.
The new cybersecurity guidelines from the National Association of Insurance Commissioners have been endorsed by the Treasury Department. The NAIC hopes all states will follow South Carolina's lead and implement the model law, which protects consumer information.
A report released by email security firm Agari revealed that the Domain-based Message Authentication, Reporting and Conformance protocol has been fully implemented by the Health and Human Services Department for 105 of 118 domains and has been implemented by the agency at some level for 114 domains as of Sept. 14, taking the lead in DMARC implementation among federal agencies. The General Services Administration follows HHS in the number of domains secured, having fully implemented the protocol on 86 domains and achieved some level of DMARC on 94 domains.
The Trump administration is holding a meeting with companies including Alphabet, IBM and JPMorgan Chase, as well as industry experts, to discuss improving quantum information science. While quantum computing could affect health care, communications and artificial intelligence, it could also pose a threat to national security unless implemented correctly.
- Page 1