WHITE HOUSE’S CYBER SECURITY ANNOUNCEMENT

WHITE HOUSE’S CYBER SECURITY ANNOUNCEMENT Below is the White House’s announcement of its Cyber Security initiatives for 2015.  We will have analysis of these proposals shortly. The problem is that government and the private sector are still not always working as closely together as we should. Sometimes it’s still too hard for government to share…

CLBR SEGMENT 2: STAN STAHL ON CYBER SECURITY

Stan Stahl, President of Citadel Information Systems, returns to discuss the latest Cyber Security issues.   BACKGROUNDER You Say Tomato, I Say You Got Hacked? GoDaddy Hacked, or Just a Technical Glitch?, Technorati GoDaddy outage makes websites unavailable for many Internet users (Updated), ArsTechnica At publication time, there was no evidence to support claims that…

CLBR: Amazon Tax and NoDaddy

Wednesday two Cyber Law and Business Report regulars return. Segment 1: Rebecca Madigan of the Performance Marketing Association discusses the upcoming September 15th implementation of the Amazon Tax in California and efforts in Washington. Segment 2: Stan Stahl from Citadel Information Systems discusses the latest in Cyber Security, including the GoDaddy hack and the debate…

CLBR Segment 1: Josh Levy from Free Press on CISPA and Stop Cyber Spying Week

Stop Cyber Spying Week On Monday, public interest groups and civil liberties organizations launched a week of Internet-wide protests against the Cyber Intelligence Sharing and Protection Act of 2011 (CISPA), the controversial cybersecurity legislation that would negate existing privacy laws and allow companies to share user data with the government without a court order. The…

Cyber Security: FCC Proposes Cyber Security Guidelines & March Victims

FCC Offers Voluntary Cyber Security Guidelines The Federal Communications Commission’s Communications, Security, Reliability, and Interoperability Council (CSRIC) released its initial recommendations addressing cyber security threats in commercial networks.    CSRIC recommended that ISPs (i)  adopt an Anti-Bot Code of Conduct that would help detect and remediate bots; (ii) take the first steps towards implementation of DNSSEC secure…

Cyber Security/Cyber Espionage Notebook 1.0

(1) DATA BREACH REGULATION Summary of State Data Breach Laws http://bizsecurity.about.com/od/informationsecurity/a/statebreach_laws.htm Bill to Plug Data Breaches Stalls, Politico http://www.politico.com/news/stories/1111/67464.html#ixzz1ceKiD0Qo (2) CYBER ATTACKS AND CYBER ESPIONAGE Is a Cyber Pearl Harbor on the Horizon, Time Magazine http://battleland.blogs.time.com/2011/08/22/is-a-cyber-pearl-harbor-on-the-horizon/ Cyber Attacks a Growing Threat to US Businesses and National Security, Cyber Report https://ilccyberreport.wordpress.com/2011/09/15/cyber-attacks-a-growing-threat-to-us-business-and-national-security/ Feds Cite Chinese Cyber Army…