Prioritize ‘Human-Centered Cybersecurity’ per Federal Cyber R&D Guidance

January 13, 2024
1 min read

TLDR:

The National Science and Technology Council has released a guide document titled the 2023 Federal Cybersecurity Research and Development Strategic Plan, which emphasizes the importance of “human-centered cybersecurity.” This approach to cybersecurity focuses on the needs, motivations, behaviors, and abilities of end users. The plan criticizes traditional cybersecurity for putting too much emphasis on technology and not enough on people, as cyber attackers exploit human actions. The proposed approach aims to involve end users in the development of secure digital technologies, factor in user preferences when designing digital technology, and develop methods to evaluate the effectiveness, usability, inclusivity, and user experience of cybersecurity solutions.

The 2023 Federal Cybersecurity Research and Development Strategic Plan was created by the Networking and Information Technology Research and Development Subcommittee, and it updates the 2019 plan to align with the goals of the Biden administration. The plan is part of efforts to prioritize research and development efforts to enhance cybersecurity in the US.

Key Elements:

  • The National Science and Technology Council has released the 2023 Federal Cybersecurity Research and Development Strategic Plan.
  • The plan emphasizes the importance of “human-centered cybersecurity” and criticizes traditional approaches for focusing too much on technology.
  • The proposed approach aims to involve end users in the development of secure digital technologies and evaluate the effectiveness and user experience of cybersecurity solutions.
  • The plan is part of efforts to advance the goals of the Biden administration and prioritize cybersecurity research and development.

Latest from Blog

Apache’s OFBiz gets new fix for RCE exploits

TLDR: Apache released a security update for OFBiz to patch vulnerabilities, including a bypass of patches for two exploited flaws. The bypass, tracked as CVE-2024-45195, allows unauthenticated remote attackers to execute code