Computer scientists are at work on an advanced networking security method that could make malicious "route hijacking" -- in which a company or individual's traffic is diverted from its path and intercepted -- a thing of the past. Engineers are working to find a more secure and reliable way to help networks verify the authenticity of IP addresses under the Border Gateway Protocol. Alternative security methods for the protocol, such as Route Origin Verification, are being reviewed by the Internet Engineering Task Force.
Strategy is the best security. The need for smart, strategic cybersecurity leadership has never been more obvious. That's why the Brown University Executive Master in Cybersecurity brings together thought leaders from around the world, both on campus and on-line, to create the next generation of cybersecurity executives.
A lack of IPv4/IPv6 feature parity is keeping some vendors from adding support for the next-generation Internet protocol to new products, according to engineers in charge of administering the transition. The issue was brought to the forefront by Apple's recent decision not to add support for IPv6 to Version 6.0 of its AirPort Utility wireless-configuration solution.
House lawmakers voted to advance a controversial cybersecurity bill on Thursday, in spite of the objections of a vocal group of critics, including President Barack Obama. The Cyber Intelligence Sharing and Protection Act -- which would make it easier for government and private industry to share Internet subscriber data -- passed the House 248-168, but faces an uncertain future in the Senate, where legislators are drafting their own cybersecurity bill.
PC maker Acer says it expects the second half of the fiscal year to be a bit brighter, thanks to Microsoft's impending new version of Windows and demand for ultrabook devices. The vendor expects industry growth to take place this year and hit double digits next calendar year. "We have restarted on a positive cycle and are improving day by day," said Acer Chairman J.T. Wang, who expects his company will move from fourth place into third place in the market.
Businesses and their employees do not see eye to eye on the value of emerging bring-your-own-device programs, according to a poll by Mimecast. The survey of 500 IT professionals found that about half see the consumerization of IT as a positive trend for businesses, but noted that while employees are bullish on BYOD, management remains more skeptical, citing security concerns. "These results show a massive divide between employee sentiment and what the enterprise is actually willing to support when it comes to personal devices," said Orlando Scott-Cowley, senior product marketing manager of Mimecast.
A well-known experiment showed that people who find something out for themselves believe in it more strongly than do those who are simply told it. Managers can tap into this insight by asking questions that give team members ownership over the organization's mission.
"What it comes down to, of course, is that when people make their own decisions, they are more dedicated to everything that follows," Scott Keller writes.
The Department of Energy has approved funding for what will be the largest digital camera in existence when it's complete, with the ability to take a single wide-angle photograph of an area 49 times bigger than the moon. The three-ton camera -- which will become part of the Large Synoptic Survey Telescope based in Chile -- will be used to take extremely detailed images of the night sky, capturing up to 30 terabytes of data each day, or the equivalent of 800,000 8-megapixel pictures.
The broader problem here is that much of this critical infrastructure simply relies on players behaving correctly. In a truly global system like the Internet, you must assume that organizations will occasionally make unintentional mistakes.