Sen. Dianne Feinstein has drafted a bill to protect companies from lawsuits when they share data with government entities to prevent or mitigate a cyber threat.
Though standards lack, sharing threat data is vital, says EMC's Christopher Harrington.
Although it appeared as if another year would go by without any action on cyber security legislation, President Obama may turn to an executive order to implement new policy.
The incentive-driven Cyber Security Act of 2012 is expected to be discussed as early as this week, and supporters hope to fast-track its approval before the August Congress recess. Count President Obama as one of those people.
The only way to gain the upper hand on today's advanced adversaries is by being proactive -- even aggressive, a tactic that can take many forms, says Joel Yonts, CISO of an automotive supply company.
Private and public sectors must take seriously the need to share threat data to prevent cyber attacks, but a heavy-handed approach like CISPA places us at far greater risk as a country.
A group of Republican senators on Thursday introduced a competing bill to the bipartisan Cybersecurity Act of 2012, which was unveiled two weeks ago.
A new version of a federal law designed to protect the nation's critical assets is toned-down from previous cyber security proposals, but business and privacy leaders have concerns.
Security experts believe a member of Anonymous hacked into the email account of a law enforcement official, which provided them the credentials necessary to eavesdrop on an FBI-led conference call.
Intelligence-driven information security is the future of battling advanced persistent threats, according to a new report.
Microsoft plans to make available a real-time feed containing data on cyber attacks to help other organizations protect its customers.
The Cyber Intelligence Sharing and Protection Act of 2011 would give the federal government authority to share classified cyber threat information with the private sector.
Security professionals must establish relationships with their local FBI agents, and relevant information-sharing bodies, as well as have a plan of action before being hit with a breach.
"Cyber Atlantic 2011" aimed to clarify how the two nations can best communicate about cyber incidents that occur on government systems or critical infrastructure.
An overreliance on compliance and limited information sharing between the federal government and the private sector have resulted in attackers holding a firm edge over security professionals. How do we take back a decade of losing?
The FBI must bolster its information sharing and cybersecurity expertise to effectively investigate and combat the most serious cyber intrusions, according to a new audit.
A cybersecurity operations center has launched as part of the Multi-State Information Sharing and Analysis Center (MS-ISAC), a nonprofit whose mission is to facilitate threat collaboration among state and local governments. The new center will conduct real-time networking monitoring, allowing for the round-the-clock release of threat warnings and vulnerability information, as well as general outreach and education. The goal is to "provide direct managed and monitored security services to a greater number of" state, local, territorial and tribal governments, according to a news release issued last week. - DK
Sign up to our newsletters
SC Magazine Articles
- Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more
- House, in rush vote, passes Intelligence Authorization Act
- More than 100K WordPress sites compromised by malware due to plugin vulnerability
- Phishing email contains Word doc, enabling macros leads to malware infection
- U.S. accounts for most Mac OS X attacks and websites seeded with malware
- White House calls Sony hack a "serious national security matter," gov't mulls proper response
- 'Spark' shares traits with Alina, JackPOS, uses AutoIt differently
- California nonprofit sues San Diego Police Department over stingray documents
- Critical 'Misfortune Cookie' bug puts millions of internet-connected routers at risk
- Securing the enterprise with the five W's of access