The oddly named cyber vulnerability, Heartbleed, is everywhere in the tech news. Even non-tech security types recognize the seriousness of this issue. What is the bumper sticker version of Heartbleed, and what does it teach us? While the Open Source aspects of the Internet yield incredible innovations, they also open up vulnerabilities.
“Balkanization” is a splitting into many opposed factions closely located in one area. It ain’t good to be Balkanized, but that is what is happening to the Internet, and there is nothing Washington can do about it. The Obama Administration’s move to let go of U.S. government control over the naming rights of Internet sites is being viewed as the latest in a long line of U.S. withdrawals from control of the Internet.
As a new DHS Secretary takes the helm, Security Debrief contributors came together for the First Chris Battle Homeland Security Colloquium. In the spirit of the late Chris Battle’s vision for debate and discussion on pressing homeland security matters, contributors weighed a series of important questions about DHS’ future.
The House Homeland Security Committee did something yesterday it has not done in the past several years, for anyone: it came out in full force for DHS Secretary Jeh Johnson’s maiden appearance before the committee. It was a positive performance by the Secretary, who showed himself adept at answering questions, even as his lawyer’s instincts kept him from falling into political traps.
On Thursday, February 27, 2014, Security Debrief and Catalyst Partners will host the First Annual Chris Battle Homeland Security Colloquium. Security Debrief’s expert contributors will come together to discuss and debate the current state of U.S. homeland security, DHS, and the threats and priorities the country will face in the year ahead.
By Gary Warner
This week, President Obama unveiled a set of guidelines issued by the National Institutes of Standards and Technology and a new public-private partnership program. While I join with others in applauding Mr. Obama’s creativity in making progress in protecting our nation’s cyber infrastructure, it is important to note what is and what is not being addressed by these guidelines. Where, for example, does the Target Breach fall?
Of all the big stories to keep your eye on for 2014, what are three, base-level “working-stiff” issues? They are mobile computing, defense readiness, and the connection between Special Operation Forces and intelligence. If we can get these right, it would take us a long way towards better security.
Bitcoin is a new digital currency. The Cyber age has vastly changed our day-to-day relationship with money, and Bitcoin is here to stay in some shape and form. But is it real money? The bottom line is simple: as people accept Bitcoin as a means of exchange for goods and services, then it’s a currency.
Insiders have said that Cyber Coordinator Mike Daniel will drop Supply Chain Security from his pending revision of the Obama cybersecurity policy. Dropping one of the most crucial aspects of cyber as a point of focus would be unfortunate. Active supply chain security for cyberspace is absolutely required if we are to get ahead – and stay ahead – of the numerous threats we face.
The Honorable Jeh Johnson has been nominated to replace the long departed Secretary of the Department of Homeland Security (DHS) Janet Napolitano. Strangely, President Obama has portrayed Johnson as a highly qualified candidate. The President seems to be the only one who is impressed. There are a couple of major holes in Johnson’s resume.