Language Selection

English French German Italian Portuguese Spanish

US Advisory panel recommends more federal R&D spending

Filed under
Security

The Presidential IT Advisory Committee (PITAC) has recommended the federal government sharply increase its spending on cybersecurity R&D and shift the focus to fundamental, long-term solutions to security challenges.

"The IT infrastructure is highly vulnerable to premeditated attacks with potentially catastrophic effects," PITAC warned in a letter submitting the report, titled Cyber Security: A Crisis in Prioritization, to the president. "These vulnerabilities put the nation's entire critical infrastructure at risk."

Current practices of patching vulnerabilities as they are found address immediate needs, but the committee concluded that "fundamentally different architectures and technologies are needed so that the IT infrastructure as a whole can become secure."

The government has a vital role to play in supplying the intellectual capital to improve IT security, PITAC said, but in recent years its focus increasingly has been on short-term problems addressing the needs of the military and intelligence communities. The results too often are classified, and more effort is needed to transfer them into the mainstream market.

The advisory committee examined funding for basic research by the National Science Foundation, the Defense Advanced Research Projects Agency, the Homeland Security Department, the National Security Agency, and the National Institute of Standards and Technology.

NSF, with its $30 million Cyber Trust program, is the primary source of funds for civilian security research. PITAC recommended that the program be expanded by at least $90 million annually.

The $5.47 billion NSF appropriation for fiscal 2005, approved by Congress in November 2004, is more than $60 million less than fiscal 2004 funding, and $227 million less than requested by the president.

PITAC recommended that:

  • NSF R&D funding be increased by at least $90 million a year, while also substantially increasing funding for DARPA and DHS.
  • Government increase efforts to expand the number of cybersecurity experts in the academic community, doubling the number by the end of the decade. The committee estimates there are fewer than 250 cybersecurity specialists working now.
  • Security technology transfer programs be strengthened to speed the introduction of needed off-the-shelf tools and technologies into the marketplace. The government should sponsor an annual interagency conference to showcase the results of cybersecurity R&D.
  • The Interagency Working Group on Critical Information Infrastructure Protection should coordinate federal R&D efforts and be integrated under the Networking and Information Technology Research and Development Program.

The committee identified 10 critical areas for future research:

  • Computer authentication methodologies, so sources of packets can be traced in large-scale networks
  • Secure fundamental networking protocols
  • Secure software engineering
  • End-to-end system security, rather than merely secure components
  • Monitoring and detection to quickly identify problems
  • Mitigation and recovery methodologies to avoid catastrophic failure when problems occur
  • Cyberforensics tools for aid in criminal prosecutions
  • Modeling and test beds for new technologies
  • Metrics, benchmarks and best practices for evaluating the security of security products and implementing them
  • Nontechnical societal and government issues.

Article on gcn.com.

More in Tux Machines

SHIRTS AND METHODS TO IDENTIFY THE PLAYERS - NFL JERSEYS

The jersey inside outwards, observe the situation embroidery section. Genuine jerseys are embroidered was "Z" shaped, embroidered on shirts, very smooth, in-house embroidery almost no sense of touch. Cheap nfl jerseys from china. The fakes are tight with the line directly to the number sewn on clothes.

Cheap nfl jerseys wholesale. Genuine Hawks player version jersey. Careful observation will find clothes with black "Z" shaped seams on clothes, that this line will be connected to the number and shirts, can make the wearer feel very comfortable, there will be uneven sense!

Finally, I want to make a comparison between true and false jersey, we want to want to buy a shirt to help a friend. Want to buy legal copies of NFL jerseys in the country is quite difficult. Domestic NFL licensed should be small. I discovered two years ago have sold Packers and bengals jerseys offset printing adults at a Reebok store in Xiamen. The price is very expensive, like the shelves soon after never seen. Now search for Taobao, filled with many counterfeit NFL jerseys player version. Cheap jerseys free shipping. Most of these jerseys rough work, by a number of embroidery, the workmanship is very sick.

Seven tips for reinvigorating your SMS campaign

Mobile marketing has come a long way in the last decade. Mobile marketing has gone from being a marketing channel to an entire industry encompassing dozens of marketing channels. While newer mobile technologies such as push notifications, QR codes, and geo-targeting have been getting all of the attention, it is still the humble text message that dominates the industry. While other channels can be beneficial, none can replace the value of a good SMS campaign. Seven tips If you’ve been neglecting your SMS campaign, here are seven tips to get it back on track: Encourage interaction. In the past, marketing efforts have always been focused on one-way communication. With mobile marketing, simply sending texts isn’t enough. In fact it comes across as spamming. A better option is to encourage interaction. For instance, customers who opt-in to receive your texts should be rewarded with a positive experience. Make sure messages are timely. You’ll find that certain messages are more effective at certain times. Sometimes it’s obvious but other times it won’t be. Texts sent by a restaurant about a lunch time special will be more effective when sent just before lunch time. Make sure you’re sending texts that are relevant, valuable, and timely. No marketing effort exists in a vacuum. Every business should be using at least a few different marketing channels. SMS is a great way to tie them all together because nearly everyone has a mobile device capable of texting. SMS marketing can link your email campaign to your social media campaign, and your social media campaign to your content marketing campaign and any other marketing channels you might have. Supplement your local advertisements. Despite the tremendous success of digital marketing strategies, traditional advertising channels such as radio and print ads can still be effective. In can be difficult to measure the effectiveness of these efforts however. You can use SMS to measure success by including a short code and keyword in your traditional advertising then watch how many opt-ins you get as a result. The trouble with sweepstakes has always been that people don’t want to take all the time to enter a sweepstakes they probably won’t win. SMS makes it extremely easy to enter sweepstakes. In fact, it’s one way to get people to opt-in. Customers can enter by simply texting a keyword to a short code. Provide in-store recommendations. A major fear about mobile is that it’s robbing businesses of their foot traffic. So much shopping is done online these days that many business owners worry they can’t compete. Mobile doesn’t have to work against in-store business however. In fact, mobile can improve it. For example, an auto parts store might allow customers looking for a specific part to text a keyword to a short code in order to get reply with the correct part. Use SMS to build loyalty. Typically, it’s 20% of your customers that are driving 80% of sales. SMS is a great way to get those kinds of customers. Make sure you’re doing everything you can to build a solid SMS marketing list. Mobile Technology News brought to you by businesstexter.com Source: streetfightmag.com/2014/08/18/7-strategies-for-better-text-message-marketing/

Linux kernel developer Dmitry Monakhov arrested for protesting Ukraine invasion

Linux kernel developer Dmitry Monakhov was detained for 15 days for disobeying a police officer on Saturday. The debacle came about when Monakhov decided to protest the recent invasion into Ukraine by Russian armed forces. This was not the first incident of aggression towards Monakhov. During a rally in July of 2013 he was reported to have been beaten in one of the police vans most likely for participating in expressing his discontent with Putin’s policies regarding human rights. According to Monakhov’s tweet the day before his most recent run in with the authorities, he announced, “I am a Russian. Not cattle. Not a killer. And it is not the occupier. I am ashamed that my president Putin. At 9.00 I go to Manezhku [Manezh Square] against the war.” after this tweet, pictures surfaced a day later of four Russian policeman arresting him. Read more

Thank You Akademy 2014 Sponsors

Akademy is a non-commercial event, free of charge for all who want to attend. Generous sponsor support helps make Akademy possible. Most of the Akademy budget goes towards travel support for KDE community members from all over the world, contributors who would not be able to attend the conference otherwise. The wide diversity of attendees is essential to the success of the annual in-person Akademy conference. Many thanks to Akademy 2014 sponsors. Read more