Cynthia Brumfield

Cynthia Brumfield is a veteran communications and technology analyst who is currently focused on cybersecurity. She runs a cybersecurity news destination site, Metacurity.com.

New DOE document names China, Russia as threats to US bulk power system

New DOE document names China, Russia as threats to US bulk power system

A US Department of Energy RFI seeks information on energy industry's supply chain security practices following executive order to develop industry regulations.

Domestic 5G development at core of US communications security plan

Domestic 5G development at core of US communications security plan

New NTIA document outlines White House 5G security goals, which promote home-grown R&D and call for continuous risk assessment and management.

Bipartisan bill could bring back the White House national cyber director role

Bipartisan bill could bring back the White House national cyber director role

Cyberspace Solarium Commission leaders introduce the National Cyber Director Act to reintroduce cybersecurity expertise into the White House.

New Republican bill latest in long line to force encryption backdoors

New Republican bill latest in long line to force encryption backdoors

Here we go again. Senate Republicans push a new bill to mandate "lawful access" to encrypted devices and data. It won't end until law enforcement has better cyber forensics capabilities.

Data security risks threaten approval of Chinese undersea cable plan

Data security risks threaten approval of Chinese undersea cable plan

The US government's "Team Telecom" wants to partially deny a proposed undersea cable connection between the US and Hong Kong over surveillance, data theft concerns.

Revised DOJ compliance guidance offers risk-management lessons for cybersecurity leaders

Revised DOJ compliance guidance offers risk-management lessons for cybersecurity leaders

Prosecutors use this guidance to assess criminal liability in a compliance breach, so it behooves business and security leaders to understand the expectations.

Senate subcommittee blasts FCC and Team Telecom approach to Chinese supply chain threats

Senate subcommittee blasts FCC and Team Telecom approach to Chinese supply chain threats

A report claims that oversight of Chinese telecoms for security threats to the US communications supply chain is lacking and without adequate authority.

New cybersecurity recommendations for US government target IoT, social media

New cybersecurity recommendations for US government target IoT, social media

The COVID-19 pandemic spurs the Cyberspace Solarium Commission policy initiative to issue a set of four security recommendations for the federal government in the wake of the crisis.

Cyber LEAP Act aims for innovations through Cybersecurity Grand Challenges

Cyber LEAP Act aims for innovations through Cybersecurity Grand Challenges

New bill seeks to set up competitions across the US to spur security breakthroughs.

Executive order boots “foreign adversaries” from US electric grid over security concerns

Executive order boots “foreign adversaries” from US electric grid over security concerns

White House action implies that China is "creating and exploiting" vulnerabilities in the US power grid. Experts say hardware backdoors have the potential for doing significant damage.

4 critical issues surrounding contact-tracing apps

4 critical issues surrounding contact-tracing apps

As countries rush to release contact-tracing apps, experts fear a lack of security and privacy controls.

Attempted cyberattack highlights vulnerability of global water infrastructure

Attempted cyberattack highlights vulnerability of global water infrastructure

Water utilities often have few cybersecurity resources and are subject to few regulations. A failed Stuxnet-like attack on Israel's water supply shows how dangerous that could be.

No election security funding in latest round of stimulus funding

No election security funding in latest round of stimulus funding

Doubts raised about funding for 2020 election security and mail-in voting as money omitted from the latest stimulus bill.

Legions of cybersecurity volunteers rally to protect hospitals during COVID-19 crisis

Legions of cybersecurity volunteers rally to protect hospitals during COVID-19 crisis

The COVID-19 Cyber Threat Intelligence League and other groups cooperate with the industry, law enforcement, and the government to prevent attacks on healthcare providers.

Mail-in ballots during COVID crisis necessary, but with risk says expert

Mail-in ballots during COVID crisis necessary, but with risk says expert

Noted election security researcher Harri Hursti says mail-in voting is likely the only option for a safe, secure US presidential election, but voter and election worker training needed.

Trump administration moves to revoke China Telecom's US licenses on security grounds

Trump administration moves to revoke China Telecom's US licenses on security grounds

A legal filing claims China Telecom is in violation of federal and state cybersecurity and privacy laws, but evidence is redacted.

Beware malware-laden emails offering COVID-19 information, US Secret Service warns

Beware malware-laden emails offering COVID-19 information, US Secret Service warns

Many of the emails take advantage of an unpatched, decades-old Microsoft Office vulnerability to deliver malware. Advice: Patch now.

White House strategy paper to secure 5G envisions America leading global 5G development

White House strategy paper to secure 5G envisions America leading global 5G development

Though light on details, the paper offers clues as to how the US government sees the development and security of 5G communications moving forward.

New coronavirus-era surveillance and biometric systems pose logistical, privacy problems

New coronavirus-era surveillance and biometric systems pose logistical, privacy problems

Governments and companies are using biometrics and geolocation to identify and track potential coronavirus victims in the name of public safety.

Virtual security conferences fill void left by canceled face-to-face events

Virtual security conferences fill void left by canceled face-to-face events

Notable members of the infosec community are creating impromptu but highly popular virtual events using cheap, off-the-shelf tools.

Load More