Cybersecurity and Cyberwarfare

The use of computers and the Internet in conducting warfare in cyberspace.

US telecommunications players balk at foreign ownership reporting proposal

A wide range of telecommunication companies and trade associations in the US oppose a new Federal Communications Commission proposal that would require regular reassessments of a foreign carrier's authorization to provide service in the US.

Chairwoman Rosenworcel’s Response to Reps. Gallagher and Krishnamoorthi Regarding Security Risks Posed By Cellular Connectivity Modules

On August 7, Reps. Mike Gallagher (R-WI) and Raja Krishnamoorthi (D-IL) wrote Federal Communications Commission Chairwoman Jessica Rosenworcel with concerns about the security risks posed by cellular connectivity modules provided by companies subject to the jurisdiction, direction, or control of the People’s Republic of China (PRC) or the Chinese Communist Party (CCP). On September 5, the Chairwoman wrote back saying that the s approach is to “deter, defend, and develop”: deter bad actors, defend against untrusted vendors, and develop a market for trustworthy innovation.

What to know about Congress’s inaugural AI meeting

Senate Majority Leader Chuck Schumer (D-NY) is convening the first AI Insight Forum on Sept 13, bringing together some of

Sponsor: 

NTCA—The Rural Broadband Association

Date: 
Sun, 10/29/2023 - 13:00 to Tue, 10/31/2023 - 12:00

CyberShare Summit provides you with information and tools to help you protect your company from cyberthreats.

Tailored to the needs of small broadband providers and with the help of government leaders and industry experts, CyberShare Summit provides you the opportunity to:

  • Examine best practices for risk management, gain insights on imminent threats and ways to manage future attacks.



Elon Musk's Shadow Rule

Elon Musk, became involved in the war in Ukraine soon after Russia invaded, in February 2022. Along with conventional assaults, the Kremlin was conducting cyberattacks against Ukraine’s digital infrastructure. Ukrainian officials and a loose coalition of expatriates in the tech sector, brainstorming in group chats on WhatsApp and Signal, found a potential solution: SpaceX, which manufactures a line of mobile Internet terminals called Starlink. The tripod-mounted dishes, each about the size of a computer display connect with a network of satellites.

What Americans Know About AI, Cybersecurity and Big Tech

Digital literacy is widely seen as an essential skill. But Americans’ understanding of digital topics varies notably depending on the subject. For example, majorities of US adults know what cookies on websites do and can identify a secure password.

White House Roundtable on Protecting Americans from Harmful Data Broker Practices

The White House convened a roundtable with civil society leaders, researchers, and policymakers on how the data broker industry monetizes personal information and actions the Biden Administration is taking to address potential harms to American consumers. The session was hosted by the White House Office of Science and Technology Policy, the National Economic Council, the Consumer Financial Protection Bureau (CFPB), the Federal Trade Commission, and the Department of Justice.

Reps Gallagher, Krishnamoorthi Write to FCC on Potential Risk of Chinese Internet Connectivity Modules Sabotaging Americans' Devices

We write to request information about the security risks posed by cellular connectivity modules provided by companies subject to the jurisdiction, direction, or control of the People’s Republic of China (PRC) or the Chinese Communist Party (CCP). Connectivity modules are components that enable Internet of Things (IoT) devices—from cars to medical equipment to tractors—to connect to the internet. Connectivity modules are typically controlled remotely and are the necessary link between the device and the internet.

FCC Proposes Voluntary Cybersecurity Labeling Program for Internet-Enabled Devices

The Federal Communications Commission is seeking public comment on a proposal to create a voluntary cybersecurity labeling program that would provide consumers with clear information about the security of their internet-enabled devices, commonly called “Internet of Things” (IoT) or “smart” devices.

TIA is helping states navigate BEAD cybersecurity requirements

As states draft their initial proposals for the Broadband Equity, Access and Deployment (BEAD) program, the Telecommunications Industry Association (TIA) is striving to help broadband offices tackle the cybersecurity aspect of the BEAD guidelines. Essentially, states must verify the vendors and suppliers to whom they award contracts have “adequate” cybersecurity and supply chain risk management (C/SCRM) plans.