NIST spells out baseline security requirements for next-gen mobile devices
Necessary, but sufficient? From Government Computer News: “The adoption of mobile devices in the workplace has outstripped the ability of smart phones and tablets to support basic security features...
View ArticleFake tech gear has infiltrated the U.S. government
A record number of tech products used by the U.S. military and dozens of other federal agencies are fake. That opens up a myriad of national security risks, from dud missiles to short-circuiting...
View ArticleMorning Bell: Cybersecurity: Do You Trust the Government with Your Computer?
“…Simply put, government regulations usually take 24–36 month to complete, but the power of computers doubles every 18–24 months. This means that any standards developed will be written for threats...
View ArticleHuawei, Altera mix FPGA, memory in 2.5-D device
Huawei and Altera will package an FPGA and a Wide I/O memory on a 2.5-D silicon interposer to bust through memory bandwidth limits in communications systems. The technology presents thorny challenges...
View ArticleReport calls China biggest cyberthreat
Ongoing Chinese cyberattacks on U.S. industry and government present a significant threat and the Defense Department should consider its ability to exclude “any foreign-produced equipment” that could...
View ArticleToshiba adds IP protection to automotive MCUs
Toshiba has revealed a security module for automotive microcontrollers meeting industry anti-hacking, anti-tamper and software theft standards. Developed at the company’s automotive development centre...
View ArticleDOD requirement to mark parts with unique DNA
A new anti-counterfeiting requirement from the U.S. Defense Logistics Agency (DLA) at Fort Belvoir, Va., is triggering pushback from semiconductor manufacturers, who claim the new requirement is not an...
View ArticleElectrical testing to track fake military parts
Counterfeit electronic components are an increasing threat to the supply chain for consumer, industrial and, more importantly, military parts. Some counterfeit parts are like counterfeit money,...
View ArticleNew DARPA Program Seeks to Reveal Backdoors and Other Hidden Malicious...
The Defense Advanced Research Projects Agency (DARPA) Information Innovation Office (I2O) will conduct a briefing in support of the anticipated Broad Agency Announcement (BAA) for the VET – Vetting...
View ArticleDesign for Security: Needed More than Ever
Tro·jan noun \trō-jən\[1] 1 : someone or something that is used to hide what is true or real in order to trick or harm an enemy 2 computers : a seemingly useful computer program that is actually...
View Article
More Pages to Explore .....