8 Matching Annotations
  1. Last 7 days
    1. ||VladaR|| It is clear that standards are picking-up. Let us prepare for follow-up on it.

    2. US National Security Agency (NSA) established the Center for Cybersecurity Standards in order to deal with increasing dependence on commercial products to secure National Security Systems.

      The NSA Center for Cybersecurity Standards will focus on:

      • 5G Security
      • Cybersecurity Automation
      • Platform Resilience
      • Cryptographic Algorithms
      • Security Protocols

      Cybersecurity standards will play increasing relevance in digital realm.

      ||VladaR||||AndrijanaG||

      Actors: 3GPP; ATIS; IEEE; IETF; ISO; IEC; OASIS; IETF; TCG; NIST; ANSI

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. National Strategy for Critical and Emerging Technologies, issued by the President of the USA in October 2020, addresses two main areas: 1) Promoting national security innovation base: incentivise science and technology develpoment, lead the development of worldwide standards and norms that reflect democratic values, develop multistakeholder National Security Innovation Base, build technology partnerships with like-minded partners

      2) Protect technology advantage: prevent IP theft and enhance research security, require security in design, strenthen export laws and regimes for technology, engage private sector to understand future strategic vulnerabilities, secure supply chain.

      The Strategy identifies two main S&T competitors: China and Russia and their activities that may undermine the USA's interests. One of the challenges for the USA is power of the whole-of-government approach to S&T developments in China and Russia.

      On international level, the Strategy argues for adopting rules and policies reflecting the US interests as well as cooperation among like-minded countries.

      The Strategy outlines 20 critical and emerging technologies. The major breakthroughs will be happening in intersections among these technologies. Thus, the Strategy argues for the holistic approach to development of critical and science technologies.

      Other concepts promoted in the Strategy are:

      • forecasting of tech developments,
      • technology risk management,
      • research security in academic and research institutions.
      • use of export law regulations

      ||VladaR||||Jovan||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  2. Oct 2020
    1. Interesting text on the shift from a maturity-based to a risk-based cybersecurity. It discusses how this shift should translate into concrete measures within companies. Some elements could be interesting for course updates, including the security module on the AI course. Perhaps also interesting for cybersecurity ||VladaR||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

    1. digital privacy and anonymity; web security; encryption; quantum computing; AI; advertising models; digital markets and subsidies; cyber warfare; IoT; (any kind of) security; ubiquitous crap software; monopolies; a corrupted political sector driven by lobby interests; and an eviscerated public sector.

      What are the Internet problems?

    2. "The problem isn't the folk who are driving all those trucks through these gaping holes. The problem is that it was the people like me who produced insanely shitty code in the first place that made all these holes,"

      What is the problem with cybersecurity?

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  3. Sep 2020
    1. ||VladaR|| This statement by Russia has a few elements:

      • confidence-building on the working/expert level
      • practical solutions
      • borrowing experience and expertise from the USA-Russia cooperation in the nuclear disarmament field.
      • while moving bilaterally - also proposing global agreement.

      ||sorina|| ||StephanieBP|| ||AndrijanaG||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL

  4. Aug 2020
    1. Trading emerging technologies: Security and human rights perspectives

      Vlada this could be a possible link to Geneva Dialogue (next steps) since it lnks technology, security, and human rights. Andrijana, please see if somebody can follow on this from our team. ||VladaR||||AndrijanaG||||MariliaM||||NatasaPerucica||

    Created with Sketch. Visit annotations in context

    Created with Sketch. Tags

    Created with Sketch. Annotators

    Created with Sketch. URL