Now NIST has incorporated these viewpoints into a second draft for Version 1.1 of its Framework. It's done so in the interest of meeting the demands of those that use the document to stay on top of the latest digital threats. The updates NIST made in Version 1.1 of its Framework (PDF) boil down to five major revisions.
CS Digest Section: Legislation and Regulation
The Pentagon will delay a Jan. 1 deadline for all of its suppliers to meet a set of new regulations largely designed to better protect sensitive military data and weapon blueprints.
Struggling ride-hailing firm Uber faces a fresh regulatory crackdown after disclosing it paid hackers $100,000 to keep secret a massive breach last year that exposed personal data from around 57 million accounts.
FCC chief Ajit Pai, said the commission will vote at a Dec. 14 meeting on his plan to rescind the so-called net neutrality rules championed by Democratic former President Barack Obama that treated internet service providers like public utilities.
A bipartisan group of House lawmakers has introduced legislation aimed at boosting congressional oversight of sensitive U.S. military cyber operations and cyber weapons.
This approval means that whoever you pay to provide you with internet access - Comcast, AT&T, Time Warner Cable, etc - will be able to sell everything they know about your use of the internet to third parties without requiring your approval and without even informing you.
Members of Congress are grappling with the new era of cyber warfare as the government works to define what acts in cyberspace should warrant a military response.
GAO has consistently identified shortcomings in the federal government's approach to ensuring the security of federal information systems and cyber critical infrastructure as well as its approach to protecting the privacy of personally identifiable information (PII).
In the modern digital age, nearly every industry relies on various computer systems to support operations. Maritime operations are no exception.
The Obama administration has failed to renegotiate portions of an international arms control arrangement so that it's simpler to export tools related to hacking and surveillance software — technologies that can be exploited by bad actors, but are also used to secure computer networks.