christianbundy

US White House_ The responsibility of cybersecurity should be tech companies' and the Federal govern

Published on January 01, 0001 by Chef Mia

Of all the things I expected to read in my morning feed of tech news, a report from the US White House stating that tech companies and governments need to stop using certain programming languages to combat cybercrime wasn't top of my list. But that's exactly what has happened and the document in question, , lays out the changes required and the reasons behind them.

The first thing that needs to go, according to the report, is the use of memory-unsafe programming languages to create the applications and codebases on which large-scale critical systems are reliant. Languages such as C and C++ are classed as being memory-unsafe as they have no automatic system to manage the use of memory; instead, it's down to the programmers themselves to prevent problems such as , either by checking the code directly or by using additional applications.

And it's not just about software, as choosing the right hardware matters a lot, too. Pick any one of the latest processors from AMD, Intel, Nvidia, or Qualcomm and you'll see that they're packed with all kinds of features to improve their memory security. One such example is the that checks to see if the correct memory locations are being addressed in the code. There's a performance impact to using it, of course, but this is true of all such measures.

I noticed there was one area [[link]] not covered in the report, though, and that's just from a few input words. Such models have been trained on code examples already in the wild, so to speak, and if a lot of that is memory-unsafe or contains several vulnerabilities, then there's a good chance that the AI code will do too. 

This was a missed opportunity by the US government to highlight the risks of using generative AI in this manner and if it's not properly addressed, we could reach a point where such models would be near impossible to unravel, because as the models continue to be trained on existing code, there's an increased chance the training will be tainted by AI-code, building on top of itself, without [[link]] ever removing the vulnerabilities.

A diagram showing the basic premise of how memory tagging works in Arm processors

How memory tagging works in Arm processors. (Image credit: Arm)

A significant challenge that the report points out is how one measures just how cyber-secure an application or codebase is. Even relatively simple pieces of software can easily run into millions of lines of code, using hundreds or thousands of libraries. Manually checking all of that, by hand, just isn't feasible but the task of creating software to do the assessment is equally demanding.

This is especially problematic for open-source software. While various can be monitored, a business can easily set up a system to ensure that this happens regularly and allocate dedicated staff to the role; open-source projects are heavily reliant on volunteers doing the same.

The report doesn't provide any solution to this and simply states the research community shouldn't ignore the issue, though I hasten rummy mars to add that the problem is so complex that no single report could ever hope to address it.

Thinking of upgrading?

Windows 11 Square logo

(Image credit: Microsoft)

: What we think of the latest OS.
: Our guide to a secure install.
: Strict OS security.

There are a couple of other aspects the Back to the Building Blocks report covers but it ends with an interesting observation: "Software manufacturers [[link]] are not sufficiently incentivized to devote appropriate resources to secure development practices, and their customers do not demand higher quality software because they do not know how to measure it."

The recommended solution to the first part of that statement is that "cybersecurity quality must also be seen as a business imperative for which the CEO and the board of directors are ultimately accountable." rummy master In other words, making software cyber-secure is the responsibility of large companies, not the individual user of said software.

Whether this report garners any rummy modern traction within the tech industry is anyone's guess at this stage but it's good to see government bodies taking the matter seriously. Is there anything we could do that would make a difference? Yes, by protesting with your wallet. Don't give your hard-earned money (or personal data) to companies that aren't actively making their products as secure as possible.

Easier said than done, of course, and that's probably true of everything covered in the White House's report.

Reader's Thoughts (3)

JackpotQueen771

Some games are a bit laggy on my phone at times, but the variety of games and the smooth desktop experience make up for it. Overall, the website offers a great gaming experience for both casual and serious players.

GameSeeker914

The deposit process is smooth and fast. I was able to fund my account instantly and start playing without any hassle. Plus, the multiple payment options make it convenient for everyone regardless of location.

SpinWizardX334

I absolutely love the game selection here, especially the slot games. The graphics are amazing and the animations are super smooth, making every spin feel exciting and immersive. I've spent hours playing without getting bored!

Continue the Journey

The Untold Story Of The Xbox 360 Avatars

**Summary:** When it launched in 2005, the Xbox 360 was, certain issues aside, a successful product. But it was also drab. Lifeless. Until, in 2008, [[link]] along came the avatars. First officially unveiled at E3 2008, Mi...

View Recipe →

These 67 Games Are All Under 4k In Size

**Summary:** You want to talk minimalist gaming, it doesn’t get more minimalist than programming an entire game that takes up only [[link]] 4096 bytes (or less). These 67 games, though, do just that. They’re the entrants i...

View Recipe →

This Is That Secret Tiny Sega Arcade Cabinet

**Summary:** After [[link]] Burner? Shocking Back in February, a series of SEGA mini deluxe cabinets was announced: https://kotaku.com/segas-biggest-arcade-games-get-the-tiniest-treatment-5154578 Thunder Blade, Space Harri...

View Recipe →

Friendly Links

สล็อต p31 เครดิตฟรี 188 u31.com เข้าสู่ระบบ u31 เครดิตฟรี 31 บาท winner55 ww winner55 สมัคร winner55 เครดิตฟรี​ winner55 ทางเข้า สล็อต​ winner55 com เพื่อ เข้า ระบบ ค่ะ สมัคร winner55 เครดิต ฟรี 188 ทางเข้า winner55 ผ่านโทรศัพท์มือถือ​ Yono all app all yono app go rummy holy rummy royally rummy rummy 365 rummy 51 rummy best rummy golds rummy mars rummy master rummy modern rummy nabob rummy noble rummy satta rummy star rummy wealth rummy win yono all app yono apk yono arcade yono business sbi yono business rummy meet joy rummy rummy new app rummy nobel rummy royal Yono all app Yono all app Yono all app Yono all app สล็อตฟรี สล็อตฟรี ทดลองเล่นสล็อตฟรี โปรโมชั่นสล็อต U31 com h25 com สล็อต m358 เครดิตฟรี 188 w69 slot เครดิตฟรี 188 บาท pxj เข้าสู่ระบบ winner55 ทางเข้า สล็อต l86.com สล็อต pg168 ทางเข้า ทางเข้า w88 ใหม่ ล่าสุด bk8สล็อตฟรี PIGSPIN เครดิตฟรี 100 huc99สล็อตฟรี dafabet mc888 riches888pg jinda44 e19 betdog sbfplay ufa747 pay69 slot ดาวน์โหลด ufa888 riches777 g2g1bet H25 h25 com สล็อต​ h25 com เข้าสู่ระบบ​ h25 com สล็อต​ h25 com เข้าสู่ระบบ​ u31 game เข้าสู่ระบบ u31 เครดิตฟรี 188 u31 เข้าสู่ระบบ w69 w69 slot ทาง เข้า​ w69 slot ทางเข้า​ w69 slot เครดิตฟรี 188 บาท​ w69 เข้าสู่ระบบ​ h25 com สล็อต​ H25 สล็อต w69 slot ทาง เข้า yono all app yono all app w69 slot H25 com สล็อต w69 slot u31.com เข้าสู่ระบบ u31 ทางเข้า u31 เข้าสู่ระบบ ทางเข้า winner55 ผ่านโทรศัพท์ มือ ถือ winner55 ทางเข้า สล็อต