Items Tagged with "Regulation"


5cbe1364caf51f95cac6484a832d66d0

Companies Focus on Growth But Lag Behind Threats

June 20, 2012 Added by:Bob Radvanovsky

Industries that are regulated or that have to adhere to a standard feel that if they simply follow the requirements that they are secured. This is a misnomer, as adherence to a regulation, governance or compliance standard is a good start, but it does not necessarily mean that an organization is "secure"...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

NARUC: Cybersecurity Guidance for State Utility Regulators

June 20, 2012 Added by:Infosec Island Admin

“Understanding risk means understanding the relationship between vulnerability (such as a system with a known but unaddressed weakness), threat (such as a bad actor propagating viruses or worms) and consequence (such as physical damage and loss of public safety). Simply understanding risks is just the first step"...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Oh No, UN Control!

June 19, 2012 Added by:Jayson Wylie

The problem is that we have a bunch of ‘Bad Actors’ seeking to undermine the United States' plan for a global internet presence and freedom of information, and replace it with their own agenda of propaganda, isolationism and censorship of their populace. There is no logical course of events here...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Tip of the Iceberg: 107,655 Cybersecurity Incidents in 2011

June 19, 2012 Added by:Joel Harding

Only a small percentage of companies will voluntarily share security information, and we can not see systemic trends. What is needed is a level playing field for all. All corporations need to disclose cybersecurity incident data so we can get a comprehensive picture a systemic defense is possible...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Congressional Witnesses Agree: Multistakeholders Right for Internet Regulation

June 15, 2012 Added by:Electronic Frontier Foundation

The threat posed by the International Telecommunication Union (ITU) is not limited to an outright "takeover" by Russia or China. ITU's vision of Internet policy-making is more like "taking control" than the transparent and bottom-up multi-stakeholder process typically associated with Internet governance...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

It’s the 90′s All Over Again, Except This Time Online...

June 15, 2012 Added by:Infosec Island Admin

It’s one thing to make something criminal, and another to attempt to force behavioral modifications that infringe on our first amendment rights. We are at the tipping point with all the cyber hubbub over warfare and criminality, and Congress will likely frak us all with their swift pens of “justice”...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

The Failure Of PCI?

June 13, 2012 Added by:PCI Guru

The biggest problem with PCI DSS standards comes down to the fact that humans are averse to being measured or assessed. Why? It makes people responsible and accountable for what they do, and few people want that sort of accountability – we all much prefer wiggle room in how our jobs are assessed...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

Organization for Computer Professionals Opposes CISPA

June 12, 2012 Added by:Electronic Frontier Foundation

ACM is the world's largest organization for computer professionals. They are joining a diverse group in opposing CISPA, including a wide array of digital civil liberties organizations like EFF, computer scientists like Bruce Schneier and Tim Berners-Lee, and companies like the Mozilla Foundation...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

National Security Leaders Urge Passage of Cybersecurity Bill

June 11, 2012

“Given the time left in this legislative session and the upcoming election this fall, we are concerned that the window of opportunity to pass legislation that is in our view critically necessary to protect our national and economic security is quickly disappearing,” the letter states...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Cybersecurity: Washington DC is a World of Grey

June 07, 2012 Added by:Joel Harding

The US State Department cannot sign many treaties in cyberspace, and we cannot establish a lot of cooperation, because there is a lack of a definition or there is no established threshold for most of what we deal with. Part of that problem is that as soon as the ink dries, most of the conditions will change...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Senator Demands Text of Secret Agreements Regulating Internet

May 30, 2012 Added by:Electronic Frontier Foundation

Senator Ron Wyden recently introduced a bill demanding access to draft texts of international trade agreements under negotiation such as the Trans-Pacific Partnership Agreement that carry provisions that could severely choke off users' rights on the Internet. This is a great positive step in the right direction...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

SCADA Security: Consequences and Difficulty with Incentives

May 18, 2012 Added by:Rafal Los

Here's the problem - when it comes to critical infrastructure protection it's very difficult to legislate and regulate the organizations that matter into a state of better security. The problem is that in order to enforce policy and rules there either have to be consequences to failing, or incentives not to fail - or both...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Healthcare Data and the (Private) Social Network

May 09, 2012 Added by:Danny Lieberman

Previously, we talked about the roles that trust, security and privacy play in online healthcare interactions. In this post we look at privacy challenges in social networks and describes how you can implement a private healthcare social network for without government regulation...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Legislation Would Stick Business with Cyberwar Costs

May 08, 2012 Added by:Headlines

"The legally mandated role of the government is to provide for the common defense, and they're willing to spend pretty much whatever it takes... If you're in a private organization, your legally mandated responsibility is to maximize shareholder value. You can't spend just anything..."

Comments  (2)

4289a029dd052b867dafc6cdf5bde53b

CISPA: The Devil is in the Details

May 07, 2012 Added by:Michelle Valdez

The problem with CISPA involves all the information added under one of the approved amendments. The vagueness about what information can be shared has caused most of the concern – especially that catch all category of “to protect the national security of the United States”...

Comments  (2)

509ea0c1f4a210534eb004d35c10aa2d

ISA President Larry Clinton Discusses Cybersecurity Legislation

May 07, 2012

Private sector advocates such as Clinton believe some of the current legislation under consideration is far too punitive in nature, and would disincentivize companies from both investing in better security measures and from disclosing data loss events...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »