cybersecurity

See the following -

The White House Big Data Report: The Good, The Bad, And The Missing

Jeremy Gillula and Kurt Opsahl and Rainey Reitman | Electronic Frontier Foundation | May 4, 2014

Last week, the White House released its report on big data and its privacy implications, the result of a 90-day study commissioned by President Obama during his January 17 speech on NSA surveillance reforms. Now that we’ve had a chance to read the report we’d like to share our thoughts on what we liked, what we didn’t, and what we thought was missing...

Read More »

The Worst Possible Cybersecurity Breaches Could Be Far Worse Than You Imagined

Josh Meyer | Nextgov | May 6, 2013

The cyber-ruffians who briefly tanked the stock market recently by faking a news tweet about an attack at the White House showed how much damage can be done with a few well-placed keystrokes... Read More »

Tidelift Introduces a Comprehensive Way for Organizations to Ensure the Health of their Open Source Supply Chain

Press Release | Tidelift | February 2, 2021

Tidelift, the premier provider of solutions for managing the open source software behind modern applications, today announced the general availability of Tidelift catalogs, an innovative way to ensure organizations can consistently manage the health and security of their open source software supply chain. "As software supply chain security makes front page news in 2021, it is more important than ever that application development teams employ a comprehensive approach to managing the open source components that make up their applications," said Donald Fischer, CEO and co-founder, Tidelift. "With the addition of catalogs to the Tidelift Subscription, organizations can be confident that they are using open source safely without slowing down development."

Read More »

TIM Review’s Evolution from Ottawa Journal to International Resource

Craig Lord | Ottawa Business Journal | September 21, 2017

From its humble beginnings as the Open Source Business Resource to its status today as an internationally acclaimed journal for academics and businesspeople alike, the Technology Innovation Management Review has made its name on staying ahead of the curve. Tony Bailetti, director of Carleton University’s TIM program, launched the journal back in 2007. At the time, it was an experiment to uncover how business owners might make use of open-source applications...

Read More »

Time To Deliver On Federal IT Reform

J. Nicholas Hoover | InformationWeek | November 13, 2012

First four years of the Obama Administration were marked by the beginnings of significant changes in federal IT. Execution will be the name of the game during the next four. Read More »

Tractor Owners Using Pirated Firmware To Dodge John Deere's Ham-Fisted Attempt To Monopolize Repair

Karl Bode | Tech Dirt | March 29, 2017

We've been noting for a while how numerous states have been pushing so-called "right to repair" bills, which would make it easier for consumers to repair their own products and find replacement parts and tools. Not surprisingly, many tech companies have been working overtime to kill these bills. That includes Apple, which recently proclaimed that Nebraska's right to repair bill would turn the state into a nefarious playground for hackers. Opposition also includes Sony and Microsoft, which both tend to enjoy a repair monopoly on their respective video game consoles...

Read More »

Trove Of Medical Devices Found To Have Password Problems

John Fontana | ZDNet | June 17, 2013

Surgical devices, ventilators, defibrillators, and monitors are among the equipment at risk. Read More »

U.S. Department of Homeland Security Warns of Cybersecurity Issues with Those Using Pyxis SupplyStation

Nicole Oran | MedCity News | April 1, 2016

Flaws within more that 1,4oo cybersecurity third-party software have been found by the U.S. Homeland Security department that are used with Pyxis SupplyStation automated medical supply cabinet. Pyxis’ medical supply cabinet is made by Becton Dickinson & Co. subsidiary CareFusion...

Read More »

U.S. Department of Veteran Affairs and UL Sign CRADA for Medical Devices Cybersecurity Standards

Press Release | Underwriters Laboratories | June 17, 2016

The U.S. Department of Veteran Affairs (VA) and UL (Underwriters Laboratories), a global safety science organization, today announced a signed Cooperative Research and Development Agreement Program (CRADA) for medical devices cybersecurity standards and certification approaches. As part of the Federal Technology Transfer Act of 1986, the CRADA mechanism was established to encourage the creation of teams to solve technological and industrial problems for the greater benefit of the country...

Read More »

U.S. Government Probes Medical Devices For Possible Cyber Flaws

Jim Finkle | Reuters | October 22, 2014

The U.S. Department of Homeland Security is investigating about two dozen cases of suspected cybersecurity flaws in medical devices and hospital equipment that officials fear could be exploited by hackers, a senior official at the agency told Reuters...

Read More »

U.S. Government Seeks Reduced Use of Custom Software, Releases New Policy to 'Free the Code'

As I've written before, there has been a shift, going back almost a decade, away from the debate over whether to use open source to a focus on the how to. The release by the Office of Management and Budget (OMB) of the U.S. Federal Source Code Policy on August 8th is the latest manifestation of this shift. It achieves the goal laid out in the Obama administration's Second Open Government National Action Plan (PDF) for improved access to custom software code developed for the federal government. The plan emphasized use of (and contributing back to) open source software to fuel innovation, lower costs, and benefit the public. It also furthers a long-standing "default to open" objective going back to the early days of the administration...

Ukrainian Power Grid Hack: What Happened and What Needs to Change?

Adam Meyer | Network World | January 14, 2016

The Ukrainian power grid hack that reportedly left 700,000 homes in the dark just before Christmas highlights how the critical infrastructure sectors must step up to the plate and work harder to keep the bad guys out. It is a safe bet that few industrial control systems (ICS) critical infrastructure organizations would rate their cybersecurity as excellent. If they know this, the hackers do too and that makes them an easy target...

Read More »

US Won't Reveal Records On Health Website Security

Jack Gillum | SF Gate | August 21, 2014

After promising not to withhold government information over "speculative or abstract fears," the Obama administration has concluded it will not publicly disclose federal records that could shed light on the security of the government's health care website because doing so could "potentially" allow hackers to break in...

Read More »

USPS Breach Wider Than First Reported

Colby Hochmuth | FCW | January 6, 2015

Social Security numbers of U.S. Postal Service employees weren't the only data to be affected in September's cybersecurity breach at USPS. The agency is now saying that the medical records of as many as 485,000 employees might also have been accessed...

Read More »

VA Tackles Medical Device Vulnerabilities and Cyberthreats

VA recently signed partnerships with Massachusetts General Hospital and Shepherd University. This collaboration's research will address cybersecurity and compatibility measures needed in devices used for VA patient care. It will also refine existing and emerging cybersecurity standards and practices for network connectable medical devices, medical data systems and other related technology. Beyond VA, the agreements could have a broad impact in standardizing cybersecurity and safety requirements within the larger public health sector. VA is contributing to industry-wide awareness of both medical device vulnerabilities and threats, while applying further tests of the Underwriters Laboratories criteria and other emerging standards.

Read More »