Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
Eliminate costly downtime!
Find out how with Free White Paper
& enter to win a Samsung Galaxy Note

www.apc.com
Data Security
Cisco UCS Invicta Series flash memory systems
Average Rating:
Rate this article:  
Obama May Sign Cyber Security Executive Order
Obama May Sign Cyber Security Executive Order

By Jennifer LeClaire
November 16, 2012 10:43AM

Bookmark and Share
"Ideally, Congress would recognize and act on the threat we face as a nation when it comes to defending ourselves against cyberwar and cyberterrorism," said security expert Chris Petersen. "If signing an executive order does nothing other than help move cyber security spending up the stack of 2013 IT budgets, it will be a win for us all."
 


Cyber security reform died in the Senate once again. But President Obama may sign an executive order to push many of the changes through.

Senate Republicans, along with a few Democrats, killed the Cybersecurity Act of 2012 by blocking its introduction to the floor, despite national security officials urging passage of the bill. Senate Majority Leader Harry Reid said the bill is "dead for this Congress."

"A bill that was and is most important to national security was just killed, and that's cyber security," Reid said. "I hope President Obama uses all the authority of the executive branch at his disposal to fully protect our nation from the cyber security threat."

Opponents expressed concern about whether the government should impose cyber security mandates on private-sector infrastructure operators and whether the military or Department of Homeland Security should take the lead in civilian cyber security.

The Obama administration had previously drafted an executive order implementing many of the chaqnges, and the president seems poised to sign it.

"Congressional inaction in light of the risks to our nation may require the administration to issue an executive order as a precursor to the updated laws we need," said White House Cybersecurity Coordinator Michael Daniel. "We think the risk is too great for the administration not to act."

Cyber Threats Increasing

Chris Petersen, CTO of security analytics firm LogRhythm, told us it's unfortunate that the president needs to consider signing an executive order on cyber security.

"Ideally, Congress would recognize and act on the threat we face as a nation when it comes to defending ourselves against cyberwar and cyberterrorism," Petersen said. "These threats are real and will only increase in the years to come -- drastically and swiftly. If signing an executive order does nothing other than help move cyber security spending up the stack of 2013 IT budgets, it will be a win for us all."

There are real and valid concerns when it comes to cyber security legislation, Petersen said. One of the main concerns is additional compliance burdens on U.S. companies. While concerns are understandable, he said, the reality is that without a measuring stick companies won't know if they have gone far enough in protecting themselves.

Finding a Compromise

"Without enforcement, some companies will just kick the can down the road and hope for the best," Petersen said. "Hopefully the Chamber of Commerce and other opponents of legislation will find a compromise solution where requirements can be implemented that mandate the necessary cyber security improvements at a manageable cost."

Petersen noted that utilities and critical infrastructure industries in the United States are under constant cyber attack from nation states and other groups. It is no longer a matter of if power grids, telecommunications networks, chemical plants, water supplies and other critical infrastructure will be attacked, he said, but when will the next attack occur.

Petersen concluded: "Bolstering their IT security hardware, policies and procedures should be mandated because the stakes are too high and the damaging blow it could land to the citizens of this country and our economy is far too great to overlook any longer."
 

Tell Us What You Think
Comment:

Name:

beebop:

Posted: 2012-11-30 @ 1:16pm PT
does anyone not see the that the government is looking to invade even more of your space ? what a bunch of peepers. maybe i should be able to come to your house and peep around. you got nothing to hide right? thats the lame argument under the guise of national security.

Ed:

Posted: 2012-11-21 @ 1:31pm PT
I wish the article included the expected requirements.

michael mellin:

Posted: 2012-11-21 @ 12:20pm PT
God Bless Obama and his staff for being ready with long overdue remedies, no matter if not complete or fully timely. Congress is pathetic.

Mark:

Posted: 2012-11-21 @ 10:04am PT
Senate Republicans didn't kill this legislation - a bi-partisan group of Senators killed it. Don't blame the GOP.



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Data Security
1.   Retailers Hacked by New Malware
2.   IBM Beefs Up Identity Intelligence
3.   Tor Internet Privacy Service Breached
4.   Tor Working To Fix Security Exploit
5.   Protect Yourself from Identity Theft


advertisement
IBM Beefs Up Identity Intelligence
To offer biz better security products.
Average Rating:
Tor Internet Privacy Service Breached
Users should assume they're affected.
Average Rating:
Protect Yourself from Identity Theft
Even if your data was compromised.
Average Rating:


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
New 'Backoff' Malware Slips Undetected into Retail Systems
'Malicious actors' are using a new variety of malware to access consumer payment data remotely through point-of-sale systems, according to a report from the Department of Homeland Security.
 
IBM Beefs Up Identity Intelligence Security Solutions
Big Blue is betting big on identity intelligence. IBM just acquired a private firm with security software to govern user access to apps and data across cloud and on-premise environments.
 
USB Security Flaw Lets Hackers Hijack PCs
Hackers can use the firmware that controls USB functions to take control of computers, say security experts. That means there may be a new class of attack for which there are no defenses.
 

Enterprise Hardware Spotlight
AMD's ARM-Based Opteron Out in $3K Dev Kit
It's dubbed "Seattle" and it's AMD's first 64-bit ARM-based Opteron processor. The low-power chip is being released as part of AMD’s Opteron A1100-series developer kit, and aimed at high-end data center needs.
 
Apple Updates MacBook Pros, Cuts Prices Up to $100
The popular MacBook Pro laptop line just got an update and a price cut of as much as $100. The MacBook Pro with Retina display now includes faster processors and double the memory.
 
Dell, BlackBerry Not Sweating Apple-IBM Alliance
IBM's recent move to partner with Apple to sell iPhones and iPads loaded with corporate applications has excited investors in both companies, but two rivals say they are unperturbed for now.
 

Mobile Technology Spotlight
BlackBerry Messenger Now Available on Windows Phone
BlackBerry's free Messenger chatting and voice app is out of beta and widely available for Windows Phone users, the company said. BBM offers secure messaging, Groups, Voice, Channels and more.
 
Virgin Mobile Offers Custom Smartphone Plans
As the wireless carrier wars continue heating up, Virgin Mobile just threw the customization coal onto the fire. The firm has debuted a no-annual-contract plan with rates based on individual use.
 
Collaboration Provider Asana Revamps Mobile App
Asana, a collaboration software provider started by a Facebook founder, is now out with a rebuilt native iOS mobile app. It replaces one that even the company admits was not up to par.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.