When a data breach occurs, companies will usually haul in third-party investigators, notify regulators, promise to do better and give any impacted consumers free credit monitoring — but we’ve reached a stage where you should consider signing up to such services anyway, given how much of our information is now available in data dumps strewn all over the internet.
The reasons a cyberattack or data breach occur vary. In some cases, such as Equifax, the failure to patch a known vulnerability that has the potential to impact software or libraries in use — and in a reasonable timeframe — has serious repercussions.
In others, unsecured databases left exposed to the internet may be the problem, zero-day vulnerabilities may be exploited in the wild before fixes are available, or in some of the worst cases, an organization or individual may be targeted by state-sponsored advanced persistent threat (APT) groups with substantial resources and tools at their disposal.
Under the new framework, dubbed the Cybersecurity Maturity Model Certification, all vendors doing business with the Defense Department will be required to be certified by a third-party assessor as fully compliant or be prohibited from being awarded the contract. The department is moving at a pace to have the compliance regime in place by mid-2020.
Arrington said that by codifying CMMC compliance, the department can—and will, by her assertion—consider it as an allowable cost of having the required certification level. By Arrington’s assessment, this will not only ensure that defense contractors have a base level of cybersecurity, but also that they are getting paid a reasonable amount to maintain that security.
The Defense Advanced Research Projects Agency has awarded BAE Systems a contract to develop a pair of cybersecurity tools designed to protect electronic information as part of DARPA’s Safe Documents program.
BAE said Tuesday its FAST Labs organization and American University will work as teammates under the first phase of the SafeDocs initiative to create a tool to automatically process digital files and identify safe features for data encoding.
The partnership will also create a toolkit for software developers who aim to prevent cybersecurity risks in platforms intended to process electronic data formats.
The Defense Department is hoping large defense contractors will be cyber mentors for small businesses and startups as it rolls out its new cybersecurity standard next month.
Ellen Lord, DOD’s acquisition chief, told reporters during a Dec. 10 briefing the department was attuned to small businesses cost-related concerns of its new Cybersecurity Maturity Model Certification. While there’s no mandate at work, Lord said big companies and industry associations should pitch in with help as the standard is implemented in 2020.
On Earth, optical communication via fibre optic cables connects continents and provides enormous data exchanges. This is the technology that allows the cloud to exist, and online services to be provided.
Optical communication between satellites doesn’t use fibre optic cables, but involves light propagating through space. This is called “free space optical communication”, and can be used to not only deliver data from satellites to the ground, but also to connect satellites in space.
In other words, free space optical communication will provide the same massive connectivity in space we already have on Earth.
Here’s the way I put it back in the early 2000’s: “The struggles of these two powerful, yet quite different wireless networks—the much-heralded 3G (telecom) and the dark horse known as Wi-Fi—will determine the direction of wireless technology for years to come. As a result, design engineers, market investors, chip manufacturers, and infrastructure vendors are closely watching this evolving struggle.” (Penton’s Wireless Systems Design magazine)
Today, however, the battle has far less to do with communication vs computational dominance and more to do with global infrastructure and spectrum conflicts between the US DoD, China and the rest of the world.
But before we get into that, a very brief overview of telecom vs. datacom history is needed.
Qualcomm’s latest Snapdragon platforms are aimed squarely at bringing 5G devices to consumers next year.
This week, at its annual Snapdragon Tech Summit, the chipmaker unveiled two new mobile computing platforms – the Snapdragon 765 and 865 – both targeted at 5G speeds and artificial intelligence processing for Android-based devices.
“We need systems that put 5G and AI together,” Alex Katouzian, senior vice president and general manager, mobile at Qualcomm, told the Tech Summit audience. He outlined Qualcomm’s roadmap for 2020, where the company plans to be a part of 5G devices released at all tiers, with AI also ubiquitously integrated into them.
Ajit Pai (pictured), chairman of the Federal Communications Commission (FCC), has announced plans to establish the 5G Fund, a $9 billion Universal Service Fund available to carriers to deploy 5G mobile wireless services in rural America.
This newly proposed investment will be allocated through a reverse auction and would target hard-to-serve areas with sparse populations and rugged terrain. In addition, the fund also will also reserve a minimum of $1 billion specifically for deployments facilitating precision agriculture needs.
Markets. The primary markets for this proposal are those that have banned Huawei, namely the USA and some allied nations. In every market, the new company could expect fierce competition from others.
Scale. Where does this new venture compete, and how does it gain sufficient economy of scale? The banishment markets are not enough, not even for Nokia and Ericsson.
Supply chain. Be sure that Huawei (and China Inc.) are working furiously to rid themselves of American choke points – it is an existential issue. What happens to the new entity when it needs to source the Chinese components and then sell into the banishment markets?