End-to-end encryption provides a foundational data protection safeguard, allowing secure data transfer between the sender and recipient while blocking it from external compromise. It also means this data can be inaccessible to law enforcement, who then must find alternative means to access that data.
According to the Department of Homeland Security's 2018 Fiscal Year Report, they will be implementing facial recognition technology to identify approximately 97 percent of airport passengers departing the country.
At its National Cybersecurity Summit in late July, the Department of Homeland Security unveiled its new National Risk Management Center, which will coordinate national efforts to protect U.S. critical infrastructure.
The White House eliminated the position of cybersecurity coordinator on the National Security Council this week. The post was central to developing policy to defend against increasingly sophisticated cyberattacks and the use of offensive cyber weapons.
The new strategy is “aimed at ensuring the availability of critical national functions” and “fostering efficiency, innovation, trustworthy communication, and economic prosperity in ways consistent with our national values and that protect privacy and civil liberties.”
By now, we’ve all heard how the citizens of Hawaii were awoken on Saturday, January 13th with a (thankfully erroneous) alert telling residents to take shelter because of an incoming ballistic missile.
While the investigations and government hearings will continue, now that we’re a couple of weeks removed from the event, it’s important to take a step back and use this opportunity to crystallize several mass notification best practices.
Joshua Dean, Director of Security for San Antonio Water System (SAWS), is in charge of keeping assets safe and secure, so that the 1.8 million people in the region don’t have an interruption to their water and sewer services.
Firms supplying essential services, e.g. for energy, transport, banking and health, or digital ones, such as search engines and cloud services, will have to improve their ability to withstand cyberattacks under the first EU-wide rules on cybersecurity.