Top
Security News |
Top 5 Security Predictions for 2013
Apparently the Mayans were wrong, and after surviving those fatal predictions, here are some predictions for the security industry for 2013, according to UK security firm Bullguard. [...]
Privacy Violations Are Being Investigated In The EU Against Microsoft
Microsoft hasn't had the best of luck in the EU in 2012. The company was previously under investigation for potential antitrust issues, and now its privacy policy is under fire. [...]
New Scam Tricking People By Offering New Facebook Profile Look
Another day, another email scam that uses Facebook to trick unsuspecting users into visiting a shady pharmaceutical site. [...]
Facebook Black Is Scamming You
As more and more people join social networks like Facebook and Twitter, it only gets easier for scam artists to pick off a few non-discerning users. [...]
|
|
Privacy Protections Are Included In Obama's Cybersecurity Executive Order
By: Zach Walton
Near the end of President Obama's State of the Union address, he addressed the need for cybersecurity reform. He also confirmed the long standing rumor that he would indeed be signing an executive order into law that helps increase information sharing between the government and private corporations. What's surprising, however, is that it does address many of the privacy concerns that privacy proponents had with bills like CISPA and CSA.
With that being said, let's get into the nitty gritty of the executive order, shall we? First up are details on how information sharing between public government entities and private corporations will work:
Sec. 4. Cybersecurity Information Sharing. (a) It is the policy of the United States Government to increase the volume, timeliness, and quality of cyber threat information shared with U.S. private sector entities so that these entities may better protect and defend themselves against cyber threats. Within 120 days of the date of this order, the Attorney General, the Secretary of Homeland Security (the "Secretary"), and the Director of National Intelligence shall each issue instructions consistent with their authorities and with the requirements of section 12(c) of this order to ensure the timely production of unclassified reports of cyber threats to the U.S. homeland that identify a specific targeted entity. The instructions shall address the need to protect intelligence and law enforcement sources, methods, operations, and investigations.
Read The Rest...
About
the Author:
Zach Walton is a Writer for SecurityProNews. He specializes in gaming and technology. Google+ |
|