Mattis: Don’t create separate military cyber service

The former defense secretary said U.S. Cyber Command needs emergency authority to be able to operate inside the United States.

The post Mattis: Don’t create separate military cyber service appeared first on CyberScoop.

Continue reading Mattis: Don’t create separate military cyber service

New cybersecurity sheets from CISA and NSA: An overview

The Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA) have recently released new CSI (Cybersecurity Information) sheets aimed at providing information and guidelines to organizations on how to effectively secure their cloud environments. This new release includes a total of five CSI sheets, covering various aspects of cloud security such as threat […]

The post New cybersecurity sheets from CISA and NSA: An overview appeared first on Security Intelligence.

Continue reading New cybersecurity sheets from CISA and NSA: An overview

House hurtles toward showdown over expiring surveillance tools

At issue is Section 702 of the Foreign Intelligence Surveillance Act, which authorizes snooping that some consider vital to security and others view as an out-of-control privacy threat.

The post House hurtles toward showdown over expiring surveillance tools appeared first on CyberScoop.

Continue reading House hurtles toward showdown over expiring surveillance tools

Declassified NSA Newsletters

Through a 2010 FOIA request (yes, it took that long), we have copies of the NSA’s KRYPTOS Society Newsletter, “Tales of the Krypt,” from 1994 to 2003.

There are many interesting things in the 800 pages of newsletter. There are many redactions. And a 1994 review of Applied Cryptography by redacted:

Applied Cryptography, for those who don’t read the internet news, is a book written by Bruce Schneier last year. According to the jacket, Schneier is a data security expert with a master’s degree in computer science. According to his followers, he is a hero who has finally brought together the loose threads of cryptography for the general public to understand. Schneier has gathered academic research, internet gossip, and everything he could find on cryptography into one 600-page jumble…

Continue reading Declassified NSA Newsletters

Confronted with Chinese hacking threat, industrial cybersecurity pros ask: What else is new? 

At the world’s largest industrial cybersecurity conference, Beijing’s operations targeting U.S. critical infrastructure was just one concern among many.

The post Confronted with Chinese hacking threat, industrial cybersecurity pros ask: What else is new?  appeared first on CyberScoop.

Continue reading Confronted with Chinese hacking threat, industrial cybersecurity pros ask: What else is new? 

Hackaday Links: March 10, 2024

Hackaday Links Column Banner

We all know that we’re living in a surveillance state that would make Orwell himself shake his head, but it looks like at least one company in this space has …read more Continue reading Hackaday Links: March 10, 2024

APT29 revamps its techniques to breach cloud environments

Russian threat actors APT29 are changing their techniques and expanding their targets to access cloud environments, members of the Five Eyes intelligence alliance have warned. About APT29 APT29 (aka Midnight Blizzard, aka Cozy Bear) is a cyber espionag… Continue reading APT29 revamps its techniques to breach cloud environments