September 19, 2024 I have taken notice lately of the number of headlines that are discussing cyberspace threats in space. Well, not just threats in cyberspace space but also kinetic threats in space. In many ways the threats are interconnected as cyberspace attacks can lead to kinetic results in space. And the likely threat actors […]

August 21, 2024 CISA has been working hard over the last 6 years to turn the tide on the never-ending stream of zero days and vulnerable systems that continue to plague our everyday lives. In 2018, it formed the ICT SCRM Task Force—a public-private partnership charged with identifying challenges and developing actionable solutions to enhance […]

August 12, 2024 It seems that most of the emails, articles and webinar invites I receive lately have Gen AI and [in]security as part of the headlines. Also, I was reading some of the reports coming back from BlackHat and it seems those same headlines (and the Crowdstrike debacle) were the major items of interest. […]

July 19, 2024 I have been interested in network access control technology since my days working on trusted computing and high assurance platform initiatives for different government entities. And today, with network access control comprising a key element of the zero trust cyber architecture discussions, I can understand how such offerings from Forescout Technologies are […]

July 10, 2024 I like returning each year to the AFCEA Technet Cyber Conference as it always has a lively exhibit hall and interesting panels and discussions. It is also focused quite a bit on government issues and solutions, although not exclusively, as members of the IC, DoD, and other federal agencies provide their insights […]

July 8, 2024 I remember making the case for automated and continuous risk assessment many years ago when the NIST Risk Management Framework (RMF) was first being drafted and put through some public review processes. Back then, the main focus of the RMF was enterprise IT systems. And back then, there were no tools that […]

Press Release – March 7, 2024 SRI chosen to deliver cyber-psychology-informed network defense technology for IARPA  The innovative program will be centered around the psychology of cyber attackers.   [March 7, 2024]: Menlo Park, CA – SRI announced today that it has been selected by Intelligence Advanced Research Projects Activity (IARPA) to deliver advanced technology for its recently announced Reimagining […]

April 18, 2024 It is evident over the last few years that central national governments are applying tighter controls on the security of software and hardware products – from labels for IoT devices in the US and abroad, to controls over AI research and bans on high risk AI models, to more timely reporting requirements on vulnerabilities, ransomware, […]

April 18, 2024 This is the second part of a two part series. You can find the first part of this feature at this link. It is evident over the last few years that central national governments are applying tighter controls on the security of software and hardware products – from labels for IoT devices in […]