Ensuring the integrity of democratic elections from hackers and electronic tampering, and boosting public confidence in democracy, isn’t very difficult, nor expensive.
As South American countries recover from a massive blackout, the US isn’t immune: The Northeast Blackout of 2003 cut power to 50 million people, and many threats to the electricity grid remain.
Power utilities’ cybersecurity practices may be effective, but need to evolve over time. And all companies operating elements of the grid – even the small ones – should step up.
Who’s in control of what’s flowing in these wires?
D Sharon Pruitt
As the microchip industry celebrates the 50th anniversary of chipmaker Intel’s founding, engineers and researchers call for a complete rethinking of computer architecture.
Can they be confident their votes will count?
4zevar/Shutterstock.com
Russian government agents allegedly penetrated US state and county election databases. Scholars of election security offer insight and recommendations about what to do now.
IAFEI and partners Duke University and Grenoble EM regularly survey CFOs across the world. For the second quarter 2018, the poll ran from May 13 to June 7, 2018.
The Australian National University has been working with intelligence agencies to minimise the impact of a cyber attack on its systems.
Mark爱生活/Flickr
Universities are uniquely placed to ensure that those who manage security of networks and data work closely with those who research and study the same problem.
Distributed Denial of Service (DDoS) attacks are up 16% in the last year.
Shutterstock
A new report highlights the worrying trends confronting security professionals – from more sophisticated hacking methods to hack-for-hire products and targeted attacks on tourism websites.
Iraqi Army soldiers South of Mosul in November 2016.
Mstyslav Chernov/Wikimedia
Keith Martin, Royal Holloway University of London and Rory Hopcraft, Royal Holloway University of London
Cyber vulnerabilities in shipping show how far the industry has to go. But proper cyber security of ships is more complex than you might initially think.
Despite its enormous cost, the metadata retention scheme wasn’t future-proof.
Shutterstock
It is hard to know whether metadata retention has been effective or necessary. We can only hope that the debate over accessing and analysing encrypted services is a little more enlightening.
What algorithm turned these lights red?
monticello/Shutterstock.com
New research has uncovered a previously unknown weakness in smart city systems: devices that trust each other. That could lead to some pretty terrible traffic, among other problems.