The National Security Agency is broadening the menu of technologies it wants to help the private sector develop.
The IoT Cybersecurity Improvement Act of 2019 has gained 12 new cosponsors in the House.
In a letter dated Feb. 27, Sens. Mark Warner, D-Va., and Marco Rubio, R-Fla., requested Dan Coats, director of National Intelligence, produce “an unclassified report on the participation of China and other adversarial nations in the international standard setting bodies (ISSBs) for fifth-generation wireless telecommunications technologies (5G).”
Panelists at a Brookings Institution event last week agreed that it’s more important to implement artificial intelligence (AI) and other “smart cities” technologies in a secure and responsible manner, rather than merely to win the race to be the first tech adopters on the block.
The Atlantic Council recommends accelerating a whole-of-government approach to developing a long-term national spectrum strategy which will include creating an inter-spectrum for 5G that will allow for Federal, state, and local policy synchronization of policies and procedures to rapidly and cost-effectively implement 5G.
Experts at a Brookings Institution panel discussion agreed today that 5G wireless technology has the potential to impact tech policy on Capitol Hill and beyond, including historically disadvantaged communities with people of color and those who live in rural areas where internet access is not as readily available as in more populated areas.
When it comes to protecting mobile devices and applications, Federal agencies need security capabilities that travel with devices and proactively protect them against all types of cyberattacks, experts say.
Rep. Robin Kelly, D-Ill., will introduce new legislation this week to “address cyber vulnerabilities created by the adoption of Internet-connected devices,” and specifically cyber threats of internet of things (IoT) devices owned and used by the Federal government.
The House on Wednesday approved by voice vote HR 6032, the SMART IoT Act, which would direct the Department of Commerce to study and report to Congress within one year on the U.S. Internet-connected device industry, including on voluntary and mandatory standards that are being developed around the world for the IoT sector, which Federal agencies have jurisdiction over the sector, and any regulations or standards those agencies have put in place that impact the IoT sector.
The Aspen Cybersecurity Group (ACG), which was formed last year by the Aspen Institute think tank to “translate pressing cybersecurity conversations into action,” has issued several policy recommendations to bolster the security of internet of things (IoT) devices including suggesting that device manufacturers invest more in building in better security, and that manufacturers be held accountable for the security of devices that they make.
The Commerce Department will soon be releasing a draft “road map” on Internet of Things (IoT) security issues, an official with the National Institute of Standards and Technology (NIST)–which is part of the Commerce Department–indicated Tuesday during a panel discussion at the 2018 Symantec Government Symposium.
Later this month government and private sector leaders will gather for a frank discussion about redefining government cybersecurity. The conversation could hardly be more timely: the Federal government is facing seemingly endless challenges, from evolving threats and aging legacy systems to budget constraints and workforce gaps.
Officials from the Federal Trade Commission (FTC) and the Department of Homeland Security (DHS) noted the importance of enforcing and creating programs to support data security and privacy for Internet of Things (IoT) devices during the Internet of Things Global Summit on Thursday.
A group of 24 technology organizations banded together to urge the Senate to pass S. 3157, the STREAMLINE Small Cell Deployment Act. In a letter released today, the group said the legislation “will modernize wireless infrastructure regulations for next-generation 5G wireless networks” and will unlock “significant consumer and economic benefits.”
Researchers at cybersecurity firm Tenable published an advisory Monday revealing a software vulnerability affecting a popular brand of surveillance cameras, whcih could be exploited to gain access to video feeds and potentially “allow attackers to remotely view feeds and tamper with recordings.”
The National Institute of Standards and Technology today released a new draft publication that takes a deep dive into the issue of trust: how can we trust that the products creeping into every aspect of our day-to-day lives are secure, safe, respect user privacy, and are ultimately tools we can depend on?
Since the Internet of Things (IoT) is a living, growing, evolving web of networks, organizations need a data architecture that can constantly adapt to its dynamic nature. For government agencies, that also means building a “holistic” data architecture that can accommodate both real-time streaming data and data stored in traditional enterprise databases, industry experts say.
The Department of Homeland Security’s Customs and Border Patrol (CBP) organization announced it has rolled out facial recognition technology at Mineta San José International Airport (SJC).
The Army needs help from academia and the private sector to modernize its workflow, explained Maj. Gen. Garrett Yee, acting deputy CIO for the U.S. Army, during an Avaya webinar today. Yee specifically stressed an interest in industry helping to make the Army’s workflows interoperable and said that “workflows at the installation level must be scalable” to achieve true modernization.
Welcome to MeriTalk News Briefs, where we bring you all the day’s action that didn’t quite make the headlines. No need to shout about ‘em, but we do feel that they merit talk.
Sens. John Thune, R-S.D., and Brian Schatz, D-Hawaii, on June 28 introduced S. 3157, the Streamlining the Rapid Evolution and Modernization of Leading-edge Infrastructure Necessary to Enhance Small Cell Deployment Act (STREAMLINE Small Cell Deployment Act), to mixed reviews from industry groups.
The House Science, Space, and Technology’s Oversight Subcommittee convened Wednesday to discuss the threat posed by international mobile subscriber identity (IMSI) catchers–which have recently come into the spotlight as tools foreign actors could be using to spy on Federal officials and perhaps even the President himself–but witnesses at the hearing said there were no easy solutions to the problem.
Robert Wilkie, President Trump’s nominee for Secretary of Veterans Affairs (VA), affirmed that IT modernization and the Electronic Health Records (EHR) Program are among his top priorities during today’s Senate Veterans Affairs Committee nomination hearing.
Small businesses are a particularly weak spot in the American armor when it comes to a potential blow that could be struck by Chinese telecommunications equipment manufacturers ZTE and Huawei.