IBM has announced that they have established new marketplaces hosted inside a hybrid cloud environment that fosters the secure development of microelectronics. The secure chip design platform will service both the commercial industry and the Defense Department. The marketplace has been named The Marketplace for Advanced, Rapid, Quanifiably-assured, Trusted Semiconductors
Yesterday, the Linux Foundation announced that it was launching a new nonprofit initiative that seeks to improve open source software supply chain security called Sigstore. Sigstore’s primary purpose is to make it easier for developers to add cryptographic signing capabilities for different components of the software development process. Linux also
Congress has called on the National Security Agency to be more transparent regarding a cyberattack that occurred in 2015 against Juniper Networks. The Juniper Networks supply-chain breach attack bears similarities to the recent SolarWinds espionage campaign, hence the emphasis on acquiring more information about it. Last week, SolarWinds sent a
A group of experts at Lawrence Livermore National Lab formed in March, aiming to produce solutions for the lack of ventilators as the world copes with the COVID-19 pandemic. The scientists and engineers’ initial work was revealed this week and is titled the Novel Emergency Response Ventilator (NERVe) Prototype. The
According to the Federal CISO Grant Schneider, supply chain security threats will be on the rise in 2020, culminating with guidance from the Federal Acquisition Supply Chain Council, which was created in late 2018. The council was formed under the SECURE Technologies act and is compromised of civilian agencies, the
The 5G Supply Chain Blind Spot: A more concerted effort to assess risk from the services supplied by our adversaries is required
Winning the worldwide “race to 5G” is a top priority for the United States. As the global competition unfolds, we have continued to hear about the technological and economic benefits associated with leadership in the wireless domain. Earlier this year, CTIA, a trade association representing the wireless communications industry, released a report that said, “America’s telecommunications operators plan to invest $275 billion to deploy 5G networks, creating 3 million new jobs and adding $500 billion to our economy.” Even though the benefits are undeniable, the U.S. has not relented on the critical security risks that must also be accounted for prior to large-scale nationwide investments in 5G infrastructure.
Even though the US Secretary of Energy has the authority to ban nuclear tech vendors that “present a significant supply chain risk,” the Energy Department has not blacklisted a single risky vendor since it was granted this authority by Congress in 2013. An audit by the Government Accountability Office (GAO)
The Department of Defense is establishing a new approach they expect their contractors, and sub-contractors to leverage. This is meant to help reduce risk and mitigate many challenges observed in implementing existing security/compliance regulations in the defense industrial base. Our review of this approach leaves us optimistic that this new approach is a positive change. Here is what you need to know.
It is a truism that every society is only a few meals away from revolution, proven not for the first time when high food prices initiated the Arab Spring, and yet food security is a woefully neglected national security concern. America lacks a national food policy, even though we are headed towards a crisis.
Studies have uncovered that several individuals used front organizations to purchase drones and equipment in Western Europe for shipment to ISIS. In one instance, two Bangladeshi brothers used their business activities in the UK, Bangladesh, Spain, Australia, the US, and Denmark to supply IT services and drones to ISIS. Elsewhere,