Blog Posts Tagged with "Congress"

37d5f81e2277051bc17116221040d51c

Cyber Security Legislation: What Does it Mean for Citizens?

April 12, 2012 Added by:Robert Siciliano

Members of Congress have recognized the need for increased security and introduced approximately fifty bills in the last session. The proposed legislation is focused on improving cyber security for citizens, critical infrastructure, and the Federal Government’s own networks...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Defense Department to Accelerate Cyber Weapons Development

April 10, 2012 Added by:Headlines

“Cyberweapons are fundamentally different... You can make a general-purpose fighter plane and it will function more or less the same in the Pacific as in the Atlantic. The same is not true for going after a Russian cyber-target versus a Chinese target..."

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

Meetings with DOD and Congress on SCADA Security

April 09, 2012 Added by:Joe Weiss

I was asked by DOD how to get an organization to address OT security. The only chance for OT security to succeed is if senior management drives it. There are only a few utilities whose senior management mandated they be secure not just compliant. What a sorry commentary...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

Four Unanswered Questions about the Cyber Security Bills

April 04, 2012 Added by:Electronic Frontier Foundation

As Congress continues to weigh the legislation and negotiate potential amendments, users should ask some serious questions about how these proposals will affect thems, and tell Congress that we won't stand for cybersecurity bills that undermine our civil liberties...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Real Questions about Huawei for US Rep. Frank Wolf

April 03, 2012 Added by:Joel Harding

The Congressman was obviously attempting to either persuade the US China Economic and Security Commission or reassure them about Huawei. He passionately made a one-sided statement but failed to provide any evidence aside from one news report in that day’s Washington Post...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Rogers-Ruppersberger Cyber Bill Gains Momentum

April 02, 2012 Added by:Headlines

“Every day U.S. businesses are targeted by nation-state actors like China for cyber exploitation and theft. This consistent and extensive cyber looting results in huge losses of valuable intellectual property, sensitive information, and American jobs..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DOD Needs Industry’s Help to Battle Cyber Attacks

March 29, 2012 Added by:Headlines

“Today, we’re in the forensics mode. We need to see the attack. If we can’t see the attack, we can’t stop it. We have to have the ability to work with industry - our partners - so that when they are attacked, they can share that with us immediately,” said Gen. Keith Alexander...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Rep. Frank Wolf: What’s with You and Huawei?

March 28, 2012 Added by:Joel Harding

What are you saying, Mr. Congressman? Are you saying there are backdoors built into the equipment? Are you saying there is malicious code embedded in the software? Are you saying there is spyware hardwired into the chips?

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Lawmakers Continue Clash Over Cybersecurity Legislation

March 22, 2012 Added by:Headlines

“It is critical that we strengthen our cybersecurity posture, and we urge Congress to recognize the need for new tools to more effectively prevent and respond to potential cyber attacks on the homeland..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Digital Posse Comitatus: Generals Obfuscate and Inveigle Congress

March 21, 2012 Added by:Infosec Island Admin

9/11 opened the floodgates to the world of warrantless wiretaps and surveillance culture we now have and diminished the lines between military and civilian agencies collection and alleged sharing of data. In the case of the NSA though, the abilities were always there...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Congressional Testimony Reveals Security at NASA Lacking

March 02, 2012 Added by:Headlines

"In its fiscal year 2010 report to Congress on FISMA implementation, the OMB reported a Government-wide encryption rate for these devices of 54 percent. However, as of February 1, 2012, only 1 percent of NASA portable devices/laptops have been encrypted," Martin testified...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS's Mark Weatherford on the Cybersecurity Act of 2012

February 23, 2012 Added by:Headlines

"The proposed legislation would enable DHS to be more effective and efficient in its protection of federal networks by clarifying DHS’ authorities in this space and enabling better sharing of cybersecurity information from other federal agencies to DHS..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Intelligence Committee Continues Probe into Chinese Telecoms

February 17, 2012 Added by:Headlines

Chairman Rogers initiated the probe last fall after a preliminary inquiry into Chinese espionage operations determined the need for further investigation into threats aimed at the U.S. technology supply chain, critical infrastructure, and proprietary information...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

How I Learned to Stop Worrying and Love Cyberwar

February 16, 2012 Added by:Infosec Island Admin

Sure, there are potential issues with regard to infrastructure and hacking/warfare, but, it is not such that we need to frame it and clothe it in the ripped flag of 9/11 do we? Obviously these guys all think so. I would beg to differ, and I find it shameful...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

What Actually Changed in Google’s Privacy Policy

February 14, 2012 Added by:Electronic Frontier Foundation

Google did a great job of informing users that the privacy policy had been changed through emails and notifications. Unfortunately, while the policy might be easier to understand, Google did a less impressive job of publicly explaining what in the policy had actually been changed...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

We Have Every Right to be Furious about ACTA

February 13, 2012 Added by:Electronic Frontier Foundation

While ACTA was only negotiated between a few countries, it has global consequences. First because it will create new rules for the Internet, and second because its standards will be applied to other countries through the U.S.’s annual Special 301 process...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »