In today's episode the CSIAC takes the most important articles in a past CS Digest and discusses the articles' importance in the world of technology and cyber security.
Topic: Cyber Legislation
Legal Cyber Security Expo is the UK’s first exhibition and conference for the world of cybersecurity in the legal sector. The event is designed specifically for law firms, professionals and organizations to educate and develop an understanding on how to enhance their cybersecurity realms and discover the future developments forecasted within the sector.
FCC chief Ajit Pai, said the commission will vote at a Dec. 14 meeting on his plan to rescind the so-called net neutrality rules championed by Democratic former President Barack Obama that treated internet service providers like public utilities.
As technology continues to evolve, the courts are being asked to apply existing laws to the new technology. In some cases, the answer is fairly straightforward, but in other cases it is more complicated and can yield varying outcomes based on how each court understands the technology and the legislators’ intent in passing the law. The presentation addressed
On June 17, 2010 a small antivirus company established in Belarus discovered the Stuxnet worm. Later research would reveal that an earlier variant of the worm existed at least a year earlier. Stuxnet reputedly caused the physical degradation of some 1000 centrifuges at the Natanz facility in Iran, based on data of the International Atomic Energy Agency
This approval means that whoever you pay to provide you with internet access - Comcast, AT&T, Time Warner Cable, etc - will be able to sell everything they know about your use of the internet to third parties without requiring your approval and without even informing you.
GAO has consistently identified shortcomings in the federal government's approach to ensuring the security of federal information systems and cyber critical infrastructure as well as its approach to protecting the privacy of personally identifiable information (PII).
Today, President Obama authorized a number of actions in response to the Russian government’s aggressive harassment of U.S. officials and cyber operations aimed at the U.S. election in 2016.
The Obama administration has failed to renegotiate portions of an international arms control arrangement so that it's simpler to export tools related to hacking and surveillance software — technologies that can be exploited by bad actors, but are also used to secure computer networks.
It could boil down to a combination of implementing industry standards, incentives and regulations, a panel of experts testified at a joint House committee hearing on Nov. 16 exploring the role of connected devices in cyberattacks.