Security News
The new AI cyber challenge will have a number of different phases. Interested would-be competitors can now submit their proposals to the Small Business Innovation Research program for evaluation and, eventually, selected teams will participate in a 2024 "Qualifying event." During that event, the top 20 teams will be invited to a semifinal competition at that year's DEF CON, another large cybersecurity conference, where the field will be further whittled down.
Representatives from Amazon, Anthropic, Google, Inflection, Meta, Microsoft, and OpenAI recently convened at the White House for a meeting with President Biden with the stated mission of "Ensuring the responsible development and distribution of artificial intelligence technologies". To continue to research the potential societal risks posed by AI and its various applications To develop AI technologies designed to address society's most significant and pressing challenges.
The Biden-Harris Administration has launched a major two-year competition using AI to protect the United States' most important software, such as code that helps run the internet and critical infrastructure. The AI Cyber Challenge will challenge competitors across the United States, to identify and fix software vulnerabilities using AI. Led by the Defense Advanced Research Projects Agency, this competition will include collaboration with several top AI companies - Anthropic, Google, Microsoft, and OpenAI - who are lending their expertise and making their cutting-edge technology available for this challenge.
The White House has weighed in on the Section 702 debate, urging lawmakers to reauthorize, "Without new and operationally damaging restrictions," the controversial snooping powers before they expire at the end of the year. Section 702 of the Foreign Intelligence Surveillance Act allows the American government to monitor electronic communications of foreign persons outside of the United States [PDF], and people they confer with, including US persons.
The White House has announced the first iteration of the National Cybersecurity Implementation Plan. The plan aims to boost public and private cybersecurity resilience, take the fight to threat actors, beef up the defense of infrastructure and draw a clear national roadmap of cybersecurity responsibilities.
It is taking the novel step of publishing the National Cybersecurity Strategy Implementation Plan to ensure transparency and a continued path for coordination. The Office of the National Cyber Director will coordinate activities under the plan, including an annual report to the President and Congress on the status of implementation, and partner with the Office of Management and Budget to ensure funding proposals in the President's Budget Request are aligned with NCSIP initiatives.
The Biden administration, last week, articulated aims to put guardrails around generative and other AI, while attackers get bolder using the technology. The post White House addresses AI’s risks...
The Biden-Harris administration today released its national cybersecurity strategy that focuses on shifting the burden of defending the country's cyberspace towards software vendors and service providers. Washington's new cybersecurity defense plan also acknowledges the collaboration between public and private sectors and with international allies and partners as essential for securing the nation against cyber threats.
The White House has begun its second annual International Counter Ransomware Summit in which Biden administration officials will convene with representatives of three dozen nations, the EU, and private business to discuss the growing threat posed by data-destroying cyber attacks. According to administration officials previewing the Summit over the weekend, the two-day event will focus on priorities like improving system resilience and developing better plans to disrupt ransomware actors in the planning phases of digital assaults.
Today's requirements [PDF] stem from US President Joe Biden's cybersecurity executive order from May 2021, which was in response to the SolarWinds disaster and other high-profile software supply chain meddling. This is essentially a guarantee from the vendor that their product meets minimum NIST standards for secure software development.