The best argument for enactment of a federal data breach protection law to replace 46 state statutes is that physical location is not relevant in a society that relies on mobile technologies, says public policy advocate David Valdez.
Aimed to be voluntarily adopted by the nation's critical infrastructure operators, the cybersecurity framework will revolve around a core structure that includes five major cybersecurity functions: Know, Prevent, Detect, Respond and Recover.
More than one-quarter of the U.S. Senate is asking the national intelligence director to reveal more information to the public regarding the government's programs to collect massive amounts of data on communications of ordinary Americans.
A side benefit of consolidating the military's 15,000 networks is the need for fewer systems administrators. Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, says that should help diminish the insider threat.
Whether or not Congress enacts cyberthreat intelligence sharing legislation, the IT security community is moving forward with its own information sharing initiatives, MS-ISAC Chairman William Pelgrin says.