Smartphones store your email, your photos and your calendar. They provide access to online social media sites like Facebook and Twitter, and even your bank and credit card accounts. And they’re keys to something even more private and precious – your digital identity. Through their role in two-factor authentication systems, the most commonly used secure digital identity protection…
Rohde & Schwarz Cybersecurity’s R&S PACE 2 DPI software features new classification for Stratum mining protocol
Rohde & Schwarz Cybersecurity has enhanced its R&S PACE 2 deep packet inspection (DPI) software to include Stratum protocol classification capabilities. The DPI engine can now reliably classify and therefore enable network security solutions to block malicious mining activities. A new category of cryptocurrency-based cyberattacks that mine cryptocurrencies on the victims PC over the internet are…
Siemens and partners sign joint charter on cybersecurity
At the Munich Security Conference today, Siemens and eight partners from industry will sign the first joint charter for greater cybersecurity. Initiated by Siemens, the Charter of Trust calls for binding rules and standards to build trust in cybersecurity and further advance digitalization. In addition to Siemens and the Munich Security Conference (MSC), the companies…
R&S Cybersecurity presents its deep packet inspection engine for secure and reliable embedded devices
Rohde & Schwarz Cybersecurity today announced that the company will present its OEM DPI engine R&S PACE 2 at Embedded World 2018 in Nuremberg, Germany, in hall 4, booth 218. By implementing R&S PACE 2 in embedded devices, vendors of firewalls, gateways, switches, and routers are able to gain full IP traffic visibility in real…
Rohde & Schwarz Cybersecurity DPI solution enables security and traffic control of critical enterprise cloud applications
Rohde & Schwarz Cybersecurity has delivered an embedded deep packet inspection (DPI) engine that serves as the core for Barracuda’s NextGen firewall F-series. The Barracuda F-series firewall is able to classify network applications up to Layer 7 in real-time, and can granularly control what applications are permitted, prioritized or de-prioritized for access. By embedding the…
Berkeley Lab Researchers Contribute To Making Blockchains Even More Robust
Blockchain—a technology used for verifying and recording digital transactions—blasted into public consciousness with the rise of Bitcoin. But this tool could also transform the way governments, global industries and even science research operate. In fact, several banks, corporations, governments and scientists have already implemented some form of blockchain to inexpensively, securely and expediently store and share information. In…
Detect Locally, Protect Globally
When infectious diseases strike, the World Health Organization acts swiftly, coordinating with the U.S. Centers for Disease Control and Prevention and its foreign counterparts to contain the threat. But there is no equivalent international organization similarly dedicated to identifying and mitigating a cyberattack. The World Economic Forum (WEF), however, is bringing together infrastructure and technology…
Association for Advancing Automation expecting 625 attendees at upcoming Forum
The Association for Advancing Automation (A3) has announced the keynote speakers for its annual A3 Business Forum, taking place January 17-19, 2018, in Orlando, Florida. A highlight of this year’s event is a keynote from Physician, Scientist and 3D Innovator Dr. Julielynn Wong. Wong will be sharing with attendees how they can provide opportunities to […]
Who’s Affected By Computer Chip Security Flaw
Technology companies are scrambling to fix serious security flaws affecting computer processors built by Intel and other chipmakers and found in many of the world’s personal computers and smartphones. The two hardware bugs discovered can be exploited to allow the memory content of a computer to be leaked. Such a leak could potentially expose stored…
December 2017 fundings, acquisitions and IPOs
Twenty-one different startups were funded in December cumulatively raising $430 million, down from the $782 million in November. Three didn’t report the amount of their funding. Only three were over $50 million of which one was a Chinese startup. Three acquisitions were reported during the month including two takeovers of Western robotics companies by Chinese…
5G Could Be China’s Gateway For Technological Domination
The highly anticipated emergence of 5G in the telecommunications industry is going to play a profound role in the entire industrial economy over the next several years. All indications point to 5G going well beyond the Internet of Things (IoT), onto broader applications involving big data transmission and artificial intelligence (AI). Having said that, the one who…
Unhackable Computer Under Development With DARPA Grant
By turning computer circuits into unsolvable puzzles, a University of Michigan team aims to create an unhackable computer with a new $3.6 million grant from the Defense Advanced Research Projects Agency. Todd Austin, U-M professor of computer science and engineering, leads the project, called MORPHEUS. Its cybersecurity approach is dramatically different from today’s, which relies…
HARTING accepted into UL client data program
Underwriters Laboratories, one of the world’s leading safety certification organizations, has granted the HARTING Technology Group the approval and license for the Client Test Data program. Under this program, HARTING is able to conduct testing in its own test laboratory, and submit the data to UL to streamline the process for UL certification. As a […]
DARPA’s Software Defined Radio (SDR) Hackfest Creates Solutions For Spectrum Challenges
The DARPA Bay Area Software Defined Radio (SDR) Hackfest came to a close on Friday, November 17 at the NASA Ames Conference Center in Moffett Field, CA. During the weeklong event, over 150 members of the SDR community came together to discuss, innovate, and ideate around the future of software radio technology and its potential…
What’s the security risk for industrial networks?
According to a cyber security study, many industrial networks connected to the internet and rife with vulnerabilities including legacy Windows boxes, plain-text passwords, and lack of anti-virus protection. CyberX, the industrial cybersecurity company safeguarding ICS infrastructures worldwide, announced its findings in its “Global ICS & IIoT Risk Report,” a comprehensive review of the current state…
Eight Cybersecurity Tools Your Business Needs Today
As hackers become smarter while businesses rely more on the cloud and technology to share and store information, we’ve seen an increase in security breaches among businesses across the country. In fact, the Identity Theft Resource Center found that breaches were up 25 percent in 2017. Many companies are simply not investing enough in IT…
‘Toolboxes’ For Quantum Cybersecurity
A quantum information scientist from the National University of Singapore (NUS) has developed efficient “toolboxes” comprising theoretical tools and protocols for quantifying the security of high-speed quantum communication. Assistant Professor Charles Lim is part of an international team of experimental and theoretical scientists from Duke University, Ohio State University and Oak Ridge National Laboratory that…
Effects Of Crippling Cyberattack Still Plague North Carolina County
Mecklenburg County, North Carolina is the state’s most populated county with over one million residents, and is home to its biggest city, Charlotte. Earlier this week, the county’s government suffered a crippling cyberattack that they’re still recovering from after malware wreaked havoc on computer systems in Charlotte and the surrounding region. Government operations throughout the…
Rohde & Schwarz Cybersecurity and Saint Security fight virus and malware with artificial intelligence-based advanced threat protection solution
Rohde & Schwarz Cybersecurity and Saint Security announce the release of a technology solution that leverages artificial intelligence, machine learning and big data-based profiling methodologies to fight advanced persistent threats (APTs). The solution identifies and blocks various types of malware that cannot be detected by off-the-shelf security solutions. The DPI engine R&S PACE 2 serves…
HADES Creates Alternate Reality To Mislead Hackers
The Russian novelist Fyodor Dostoevsky once postulated that the devil no longer employs fire and brimstone but instead simply tells you what you want to hear. Sandia National Laboratories cyber researchers go with that second option when it comes to foiling a hacker. Rather than simply blocking a discovered intruder, Vince Urias, Will Stout and…
What is the missing link in the Industrial Internet of Things?
Robert Miller, CLPA-Americas Director Much of the promise of Industry 4.0 is based upon seamless interconnectivity between production machines, enterprise systems and sources of data in the wider world. The Industrial Internet of Things (IIoT) is a key foundation of that interconnectivity through low cost, easily integrated sensors, actuators and systems. Yet in most production…
Innovation Incubator Gives Rise to Virtual Building Control Tests
A Colorado firm participating in the latest Wells Fargo Innovation Incubator (IN2) Program is partnering with NREL to refine its building energy management control systems—but there’s a twist. While it is common to install what’s called “hardware-in-the-loop” (HIL) to validate products by using physical devices, EdgePower is drawing on NREL’s building simulation competency to test…
Game Theory Harnessed For Cybersecurity Of Large-Scale Nets
Researchers have laid the groundwork for a method to improve cybersecurity for large-scale systems like the power grid and autonomous military defense networks by harnessing game theory and creating new intelligent algorithms. Purdue University is leading the research, working with counterparts at Sandia National Laboratories. The work is funded with grants totaling about $700,000 from…
S&T Reveals A Determined Cyber-Posture For National Cyber Security Awareness Month
Throughout October 2017, DHS S&T’s Cyber Security Division (CSD) promoted its role in mobilizing cybersecurity innovation as part of National Cyber Security Awareness Month (NCSAM). With a string of cyber-centered conversations taking place against the backdrop of this more than four-week event, S&T delivered a variety of informative content and cyber-savvy tips. S&T supports its wide range…
What Should Governments Be Doing About The Rise Of Artificial Intelligence?
There is little doubt that artificial intelligence (AI) is transforming almost every facet of human life. How far this transformation will go and what the full ramifications for society will be are still unknown but this hasn’t prevented people from making both optimistic and dire predictions. Elon Musk’s call for AI regulation has been matched by equal calls for governments not to.…