This would be devastating to US business and security products.
In 2013, WA agreed to add the following to their list of dual-use goods: systems, equipment or components specially designed for the generation, operation or delivery of, or communication with, intrusion software; software specially designed or modified for the development or production of such systems, equipment or components; software specially designed for the generation, operation or delivery of, or communication with, intrusion software; technology required for the development of intrusion software; Internet Protocol (IP) network communications surveillance systems or equipment and test, inspection, production equipment, specially designed components therefor, and development and production software and technology therefor. BIS, the Departments of Defense and State, as well as other agencies have been discussing the best way to add these items, which we have named “cybersecurity items,” to the Commerce Control List (CCL) (Supplement No. 1 to part 774 of the Export Administration Regulations) without reducing encryption controls and while balancing the national security and foreign policy. For resource planning purposes, as well as license requirements, license exceptions, license submission requirements, and internal license reviews and processing planning purposes, this rule is published as a proposed rule.
Secure Mentem, an industry leader in the human aspects of cyber security, today announced a strategic investment from Blackstone (NYSE: BX ) , a leading asset management and advisory firm, to help the company launch Security Awareness as a Service. The service provides a turnkey, comprehensive security awareness program, tailored to diverse corporate cultures, in order to change employee security behaviors.
The Massachusetts Institute of Technology study compared contagion rates in two scenarios, one with travel restrictions and one without the restrictions. Previous research showed that individuals who become aware of an epidemic travel by taking the shortest route to avoid infected areas, even if they are already infected. The behavior, known as selfish behavior in game theory, exposes people in uninfected areas to disease.
The researchers found that restricting individuals to specific travel routes would lower infection rates by as much as 50 percent. The research team called the difference between infection rates in the two scenarios the “price of anarchy.”
A new report by biometricresearchers at the National Institute of Standards and Technology (NIST) uses data from thousands of frequent travelers enrolled in an iris recognition program to determine that no consistent change occurs in the distinguishing texture of their irises for at least a decade. These findings inform identity program administrators on how often iris images need to be recaptured to maintain accuracy. For decades, researchers seeking biometric identifiers other than fingerprints believed that irises were a strong biometric because their one-of-a-kind texture meets the stability and uniqueness requirements for biometrics. However, recent research has questioned that belief. A study of 217 subjects over a three-year period found that the recognition of the subjects’ irises became increasingly difficult, consistent with an aging effect.
I would like to point out to NIST all they would have to do is look at the data collected by India‘s UID program to see the stability of iris over a longer period. The pilot projects that we did looked at the stability of various biometrics in many different groups to see which were the most stable and reliable. What we determined is that while iris is good it really needs to be fuzed with another biometric to be used in a multi-use application. Multimodal biometrics are required for a lifetime of identity management.
The global cybersecurity market is expected to grow from $63.7 billion in 2011 to $120.1 billion by 2017, at an estimated compound annual growth rate of 11.3% from 2012 to 2017, according to the report. “Cyberspace today is powered by a gamut of devices and applications that have made it vulnerable to threats from all kinds of users or miscreants such as students, spies, hackers, propagandists, and terrorists. Cyberspace is being used for all kinds of activities be it to gather information, raise funds, communications, or public relations, all of which have been digitized in the current globalized economy”, according to a release about the report. Cyber security or information security is a crucial aspect of information technology market, which is booming with each passing day. Securing computer environments has become a priority for the businesses across the globe. This is driving the global cyber security markettowards inventing innovative techniques for strengthening business environments. These efforts are evident in the past and future growth in the industry. It has also diversified the market with great segmentation. Basic segmentation in the market is based on the types of security, services solutions and technologies that are offered by the businesses in the industry. Geographical segmentation also plays vital role in the results and facts about forecasting trends in the security market.
When it comes to IT security, it’s best to assume hackers or cybercriminals have already penetrated your network, according to cybersecurity expert Roger Cressey. Unfortunately, Cressey said, the U.S. is still dealing with many of the same problems he saw more than a decade ago, from data beaches to security critical infrastructures. “All of those issues are still relevant today,” he said, “which means we have not done a good job of trying to address the fundamental issues that are driving cybersecurity.” “There’s a basic assumption that has to be made now,” Cressey said. “You’ve got to assume you’re penetrated. You have to assume somebody is on your network right now, sitting there and learning and watching what you’re doing.”
A recent survey of 167 attendees at the Black Hat conference in Las Vegas by security company Tripwire found that the majority of those surveyed (44 percent) believe increasing the number of highly skilled security workers on staff would be the most valuable action for improving information security at their organization. Increasing security budgets also was considered a top need by 32 percent of respondents, while 24 percent said they would have more buy-in to security goals and objectives by their board and key executives.