Disaster stories involving the Internet of Things are all the rage. They feature cars (both driven and driverless), the power grid, dams, and tunnel ventilation systems. A particularly vivid and realistic one, near-future fiction published last month in New York Magazine, described a cyberattack on New York that involved hacking of cars, the water system, … Read More “Real-World Security and the Internet of Things” »
Category: cybersecurity
Auto Added by WPeMatico
cybersecurity, hacking, internetofthings, movieplotthreats, nationalsecuritypolicy, nsa, Security technology, securityengineering
attribution, cybersecurity, cyberwar, essays, fbi, intelligence, nationalsecuritypolicy, northkorea, nsa, Security technology, sony
When you’re attacked by a missile, you can follow its trajectory back to where it was launched from. When you’re attacked in cyberspace, figuring out who did it is much harder. The reality of international aggression in cyberspace will change how we approach defense. Many of us in the computer-security field are skeptical of the … Read More “Attack Attribution in Cyberspace” »
academicpapers, cybercrime, cybersecurity, cyberterrorism, economicsofsecurity, nationalsecuritypolicy, overreactions, riskassessment, risks, Security technology
Robert Lee and Thomas Rid have a new paper: “OMG Cyber! Thirteen Reasons Why Hype Makes for Bad Policy.” Powered by WPeMatico
cybersecurity, hardware, medicine, Security technology
The Food and Drug Administration has released guidelines regarding the security of medical devices. I admit that I have not read it. Powered by WPeMatico