• The Heritage Network
    • Resize:
    • A
    • A
    • A
  • Donate
  • cyber

    Financial Regulator Considers New Cybersecurity Regulations

    The Securities and Exchange Commission (SEC) announced an initiative last week to examine the cybersecurity of 50 security brokerages. The initiative is a detailed, high-level questionnaire that derives much of its content from the National Institute of Standards and Technology cybersecurity framework released earlier this year. This could mark the … More

    Study: NIST Framework Will Harm Cybersecurity

    A new report by George Mason University’s Mercatus Center finds that the Cybersecurity Framework could “ultimately undermine cybersecurity” and diminish the “spontaneous, creative sources of experimentation and feedback that drive Internet innovation.” The Cybersecurity Framework was authorized by President Obama’s February 2013 cybersecurity executive order. The National Institute of Standards … More

    Who's Watching You Online?

    In recent years, the world has watched as Twitter and Facebook made political uprisings possible. In countries where dissidents previously had trouble making their voices heard and connecting with one another, these tools changed history. On the flipside, however, everyone from terrorists to foreign intelligence agencies rushed into the open … More

    Heritage's Carafano at SXSW Tech Conference: 'If You Care About Freedom, Care About Cybersecurity'

    If you care about freedom and prosperity, you ought to care about cybersecurity. That’s what Heritage’s James Carafano told an audience at the South by Southwest Interactive (SXSW) conference in Austin, Texas, on Sunday. Cybersecurity, a growing issue of concern around the world, was a hot topic at the nation’s … More

    A Cyber Cold War: Russia and Ukraine Trade Cyber Attacks

    Ukraine’s telecommunications system has been cyber attacked, according to the head of the country’s security service. Internet and telephone services between the Crimea region and the rest of Ukraine were cut after Russian forces seized control of Crimea, but now the mobile phones of members of the Ukrainian parliament are … More

    Terrorist Attack Shows Vulnerability in Critical Infrastructure

    Just after midnight on April 16, 2013, someone slipped into underground tunnels and cut the phone lines running to the PG&E Metcalf power substation near San Jose, California. Then two snipers proceeded to fire over 100 rounds into the substation in 19 minutes, knocking out 17 transformers. The electric company … More

    Misguided Cybersecurity Oversight

    Despite multiple recently released reports detailing cybersecurity vulnerabilities within federal agencies, Congress is still trying to give the Federal Trade Commission (FTC) greater regulatory power over data breaches. In response, the banking industry is fighting back. In a letter to the Senate Banking Committee, representatives from the financial service industry … More

    Rough Week for Cybersecurity

    Cyber attacks can come from anywhere: a global power like China, weak and non-state actors, states like Iran or Syria, or even individual cyber criminals. And the government agencies responsible for defending the nation’s cyberspace cannot even prevent breaches and attacks into their own systems. The Department of Defense (DOD) … More

    Holes in Federal Cybersecurity

      Yesterday brought news that the inspector general for the Department of Homeland Security (DHS) has found gaps in DHS’s cybersecurity. Politico reports that, according to the IG: [T]he agency for months failed to patch its systems regularly against known cybersecurity threats or scan its networks consistently, in real time, … More

    When Counting Electrical Grid Threats, Count EMP

    The North American Electric Power Reliability Corporation’s (NERC) latest test of the U.S. electrical grid left out an important component: testing the U.S.’s ability to withstand an electromagnetic pulse (EMP). The purpose of the two-day test was to gauge the response and recovery times from physical and cyber-attack scenarios. Although … More