Latest News: From all Sources
"Open data basic resource of 21st century"
EU Joinup – May 12, 2016: The Irish Minister for Public Expenditure and Reform, Brendan Howlin, has qualified open data as a basic resource of 21st century. Making government data publicly available for re-use brings economic, social and democratic benefits. That's why last year the country decided to set up a national data infrastructure....The CSO is helping other national authorities in making their data available online. It has set up a separate section on its portal where these organisations can publish their data under their own names and logos.... ...Full Story
NIST pushing holistic cybersecurity process for IoT
FedScoop – May 11, 2016: The National Institute of Standards and Technology has released a draft document imploring the engineers of internet-connected technology to build security into their systems at every step of the process.
NIST Special Publication 800-160 covers everything from smartphones to industrial control systems, intended for anyone who designs, develops, builds, implements, organizes or sustains something related to the Internet of Things — or what the agency calls "cyber-physical systems."...The new draft, released this week, builds on top of the first version of the document by integrating the international ISO/IEC/IEEE Standard 15288 for Systems and Software Engineering, approaching cybersecurity in the same way engineers approach security for physical infrastructure, such as bridges or buildings....The draft version will be open for comment until July 1, which another draft version expected to be released later this year.
You can view NIST 800-160 on the agency's website. ...Full Story
It's not just for startups: the enterprise case for open data
InformationAge – May 10, 2016: Recent years have shown that open data released by government can stimulate a vibrant startup economy in the UK. But according to a new report by the Open Data Institute (ODI), large-scale enterprises are also embracing open innovation with very real outcomes.
These include scalable new products and services; better, more accurate data; and collaborative ways of working that enable businesses to be more agile, creative and adaptable to future needs and challenges....News and information company Thomson Reuters has taken what started as an internal data management solution and created a new, collaborative information platform – Perm ID – the data from which anyone can access, use and share.
PermID, which Thomson Reuters unveiled in Autumn 2015, creates Permanent Identifiers – unique machine-readable numbers for more than 3 million organisations worldwide, including each tradable asset and many other data points.
The team behind PermID has heralded it as the 'barcode for information', having originally developed it to help integrate vast collections of databases following the 2008 acquisition of Reuters by the Thomson Corporation.... ...Full Story
NIST Kicks Off Effort to Defend Encrypted Data from Quantum Computer Threat
NIST Techbeat – May 10, 2016: If an exotic quantum computer is invented that could break the codes we depend on to protect confidential electronic information, what will we do to maintain our security and privacy? That's the overarching question posed by a new report from the National Institute of Standards and Technology (NIST), whose cryptography specialists are beginning the long journey toward effective answers.
NIST Internal Report (NISTIR) 8105: Report on Post-Quantum Cryptography details the status of research into quantum computers, which would exploit the often counterintuitive world of quantum physics to solve problems that are intractable for conventional computers. If such devices are ever built, they will be able to defeat many of our modern cryptographic systems, such as the computer algorithms used to protect online bank transactions. NISTIR 8105 outlines a long-term approach for avoiding this vulnerability before it arises....The report shares NIST's current understanding of the status of quantum-resistant cryptography, and details what the agency is doing to mitigate risk in the future. One overall recommendation for the near term is that organizations focus on "crypto agility," or the rapid ability to switch out whatever algorithms they are using for new ones that are safer.... ...Full Story
Linux Foundation Offers Badges to Certify Open Source Code Quality
VAR Guy – May 9, 2016: Which open source projects can users trust? That's a question the Linux Foundation hopes to help answer by the introduction of "badges" from the Core Infrastructure Initiative (CII) project, which recognize open source platforms deemed to be safe and stable.
Launched in 2014 in the wake of Heartbleed, which exposed an embarrassing security vulnerability in the widely used open source toolkit OpenSSL, CII is an effort to shore up security and quality in important open source projects. Previously, the support focused on providing financial resources to assist open source developers in honing their code.... ...Full Story
Critical Infrastructure Goes Open Source
EnterpriseTech – May 9, 2016: The electrical grid, water, roads and bridges—the infrastructure we take for granted—is seldom noticed until it's unavailable. The burgeoning open source software movement is taking steps to help rebuild crumbling U.S. civil infrastructure while capitalizing on expansion in emerging markets by providing software building blocks to help develop interoperable and secure transportation, electric power, oil and gas as well as the healthcare infrastructure.
Under a program launched in April called the Civil Infrastructure Platform, the Linux Foundation said the initiative would provide "an open source base layer of industrial grade software to enable the use and implementation of software building blocks for civil infrastructure."... ...Full Story
President Xi Speaks on China's Cybersecurity and Informatization Development
USITO.org Weekly – May 6, 2016: On April 19, President Xi Jinping, Chairman of the Central Cybersecurity and Informatization Leading Group (CCILG), along with Premier Li Keqiang and Liu Yunhhan, led a conference in Beijing.
According to a Xinhua report, Xi gave a speech highlighting several key trends in China's cybersecurity development, including:
- Acknowledging the central role the Internet plays in China's economic and social development, and promoting it in accordance with key themes announced in the 13th FYP, namely "innovation, coordination, greenness, openness and sharing".
- Encouraging government and party officials to listen to public opinions on the internet more closely so that they may strengthen governance in cyberspace, including online content and propaganda, and foster an online culture that is in line with the Socialist core values.
- Urging rapid breakthroughs in key technologies, emphasizing the importance of R&D and commercialization of indigenous innovation, supporting enterprises that take a leading role in innovation and participation in international competition, and exploring the establishment of alliances between industries, academics, and research institutions.
- Calling for increased awareness of cybersecurity and expediting the construction of critical information infrastructure security protection systems to strengthen defense and deterrence capabilities.
- Accelerating the development of cybersecurity legislation and regulations and strengthening technology design for cyber and information security.
- Establishing openness as a long-term guiding principle for foreign Internet enterprises, as long as they comply with Chinese law.... ...Full Story
Xiamen Introduces IPR Support Policy
USITO.org Weekly – May 5, 2016: On April 26, Xiamen launched the first nationwide "Full Coverage" IPR Support and Incentive Policy, within the scope of patents, trademarks, copyrights, integrated circuit design, geographic indication and new plant varieties.
The main policy components include:
- Expanding the scope of overseas IPR registration subsidies to include the EU, US, and Japan as well as South Korea and Australia
- Establishing an IPR finance center to encourage IP financing
- Creating a risk compensation system for IPR ventures
- Creating a subsidy system for overseas IPR protection ...Full Story
Sir Tim Berners-Lee: data poverty is the next frontier of inequality
InformationAge – May 5, 2016: The lack of free access to government data – or 'data poverty' – is contributing to widening inequality around the world, according to Sir Tim Berners-Lee.
The inventor of the World Wide Web has called out governments for not doing enough to publish their data online, which can help combat corruption and result in vital new services for citizens....Fewer than 10% of the datasets surveyed were open, and most of these are in the rich world. Almost none are in African countries....According to the study, this 'data divide' is depriving developing countries of the information tools they need to achieve the Sustainable Development Goals on education, health, environment, and rule of law.... ...Full Story
Audit: DOT needs to act on vehicle cybersecurity
FedScoop – May 4, 2016: The Department of Transportation needs a clearer idea of what its responsibilities would be in a real-world cyberattack on connected cars or other vehicles, according to a new Government Accountability Office study.
The report, completed last month but only released on Monday, concludes that numerous interfaces standard in modern vehicles are susceptible to exploits that would allow hackers to gain control of safety-critical systems, including braking and steering.
The study surveyed 32 stakeholders in the automotive industry, including eight automakers, three vehicle cybersecurity firms and seven vehicle cybersecurity researchers. A chief concern among experts was that although the National Highway Transportation Safety Administration has established a vehicle cybersecurity program, the DOT at large has not determined a response method in the case of a catastrophic vehicle hack.... ...Full Story
Let's Encrypt Reaches 2,000,000 Certificates
Electronic Frontier Foundation – May 3, 2016: The Let's Encrypt certificate authority issued its two millionth certificate on Thursday, less than two months after the millionth certificate....each certificate can cover several web sites, so the certificates Let's Encrypt has issued are already protecting millions and millions of sites.
This rapid adoption has made Let's Encrypt one of the world's largest public certificate authorities by number of certificates issued, and almost all of them are protecting domains that never supported HTTPS before. The Internet needs to migrate away from the insecure HTTP protocol, and we're very pleased to be helping to make that possible....EFF co-founded the Let's Encrypt CA with Mozilla and researchers from the University of Michigan. Akamai and Cisco joined the project as founding sponsors, and many other organizations have stepped up to sponsor the project since launch.... ...Full Story
Web Storage (Second Edition) is a W3C Recommendation
W3C.org – May 2, 2016: The Web Platform Working Group has published a W3C Recommendation of "Web Storage (Second Edition)." This specification defines an API for persistent data storage of key-value pair data in Web clients. It introduces two related mechanisms, similar to HTTP session cookies, for storing name-value pairs on the client side. The first mechanism is designed for scenarios where the user is carrying out a single transaction, but could be carrying out multiple transactions in different windows at the same time. The second mechanism is designed for storage that spans multiple windows, and lasts beyond the current session.... ...Full Story
» Back To Standards News Main
» Standards News Portal Archive