As technology continues to evolve, the courts are being asked to apply existing laws to the new technology. In some cases, the answer is fairly straightforward, but in other cases it is more complicated and can yield varying outcomes based on how each court understands the technology and the legislators’ intent in passing the law. The presentation addressed
Topic: Cyber Legislation
On June 17, 2010 a small antivirus company established in Belarus discovered the Stuxnet worm. Later research would reveal that an earlier variant of the worm existed at least a year earlier. Stuxnet reputedly caused the physical degradation of some 1000 centrifuges at the Natanz facility in Iran, based on data of the International Atomic Energy Agency
This approval means that whoever you pay to provide you with internet access - Comcast, AT&T, Time Warner Cable, etc - will be able to sell everything they know about your use of the internet to third parties without requiring your approval and without even informing you.
GAO has consistently identified shortcomings in the federal government's approach to ensuring the security of federal information systems and cyber critical infrastructure as well as its approach to protecting the privacy of personally identifiable information (PII).
Today, President Obama authorized a number of actions in response to the Russian government’s aggressive harassment of U.S. officials and cyber operations aimed at the U.S. election in 2016.
The Obama administration has failed to renegotiate portions of an international arms control arrangement so that it's simpler to export tools related to hacking and surveillance software — technologies that can be exploited by bad actors, but are also used to secure computer networks.
It could boil down to a combination of implementing industry standards, incentives and regulations, a panel of experts testified at a joint House committee hearing on Nov. 16 exploring the role of connected devices in cyberattacks.
AppSec USA is a world-class software security conference for developers, auditors, risk managers, technologists, and entrepreneurs gathering with the world’s top practitioners to share the latest research and practices, in the high energy atmosphere of Downtown Washington. Why you should attend: AppSec global conferences are a key fundraiser for the OWASP
A new proposal in the European Union would locally address many of the controversies over an international export control agreement that includes the United States.
Watchdog Report Calls for Expanded Security Guidance, But Some Experts Want New Rule.