Breaking News:

Cybersecurity

Add to Favorites | Subscribe | Share

Filters:

  • (Press "esc" to clear)

Science

Channels:

Decision Making, Coast Guard, DHS, S&T, R&D, Data Analysis, Analytics

How Coast Guard Response Is Benefitting from S&T’s University Partnerships

161026-G-AS999-005.JPG

Using this visual, user-centered platform, USCG decision makers could spot the stations most capable of responding to the disaster and helped prioritize the restoration of stations in need of repair.

Science

Channels:

Cybersecurity and Innovatoin, blockchain, blockchain software, blockchain technology, cybersceurity

Berkeley Lab Researchers Contribute to Making Blockchains Even More Robust

XBD201801-00266-003.jpeg

In the last few years, researchers at Berkeley Lab, UC Davis and University of Stavanger in Norway have developed a new protocol, called BChain, which makes private blockchain even more robust. The researchers are also working with colleagues at Berkeley Lab and beyond to adapt this tool to support applications that are of strategic importance to the Department of Energy’s Office of Science.

Science

Channels:

Cybersecurity, UAH, center for cybersecurity research and education, CSAW, programmable logic controller, OpenPLC, Machine Learning, Industrial Control Systems, intrusion prevention, embedded security

Two UAH Graduate Students Take First Place in Prestigious Embedded Security Challenge

RS51554_DSC_5914.jpg

Thiago Alves and Rishabh Das, two UAH cybersecurity Ph.D. students, placed first in the North American Embedded Security Challenge at the 14th annual Cyber Security Awareness Week in New York City this past November.

Science

Channels:

VOIP, Voice Over Internet Protocol, Checksum, Cryptophones, Crypto Phones, Cybersecurity, Authentication, end-to-end user authentication, man-in-the-middle attackes, Eavesdropping

Researchers Propose Novel Solution to Better Secure Voice Over Internet Communication

uab_credit_Safer-Voice-Over-Internet-graphic.jpg

Security researchers develop automated verification model to better secure voice over internet communication from eavesdropping and man-in-the-middle attacks.

Science

Channels:

active shooter, critical incident, DHS, S&T, R&D, Responder, responder tech, First Responder

2017 Critical Incident Exercise Tests First Responder Technologies

criticalincidentssnapshot.jpg

During this exercise, agencies tested and evaluated not only tactics, techniques and procedures, but also the efficacy of emergent relevant technologies.

Science

Channels:

Data Privacy, Online Security

Cybersecurity Expert Offers 5 Tips for Keeping Your Data Private Online

Klumplecture.JPG

Business

Channels:

Partnerships, International Partnerships, DHS, S&T, R&D

Israel & U.S.: A Unique Partnership in Science, Technology and Business

IMG_0054.JPG

Through its International Cooperative Programs Office (ICPO), S&T maintains valuable partnerships with a number of nations. The U.S. and Israel began their annual bilateral meetings in 2008.

Business

Channels:

Data breach, Consumer Fatigue, Cyberattack

Combating Data Breach Fatigue

RuiChenCropped.jpg

If you shop online or swipe a credit or debit card when out to eat, you’ve likely received a notice your personal information was compromised in a data breach. And if you’re like most consumers, chances are you did nothing in response, says an Iowa State University researcher.

Science

Channels:

Security, cybersecu

Detect Locally, Protect Globally

Cyber-Fed-Model-World-Room900.jpg

Argonne’s Cyber Fed Model provides a community-based system for near-real-time dissemination of cyberthreat indicators, defensive measures, and tools to simplify use of this information. Once the system detects an attack, it rapidly repairs the local damage while also preventing its spread.

Business

Channels:

blockchain technology, cryptocurrency, digital ledger technology

Blockchain Research Lab Director Explains Cryptocurrency and Blockchain Applications

BRLSkysong.jpg







Chat now!