Access "Security leaders help squash SOPA, PIPA pirating laws"
This article is part of the January/February 2012 issue of Combat the latest malware threats with effective antimalware planning
The White House, in mid-January, put the Stop Online Privacy Act (SOPA) and Protect IP Act (PIPA) in their rightful place, and by rightful I mean right in the circular file. A response penned by three top administration officials to a grassroots Internet petition opposing the proposed bills explained that the Obama administration would not support either of the pirating laws. Instead it called for a coordinated do-over to protect content creators from piracy from foreign websites. Cybersecurity coordinator Howard Schmidt, OMB Intellectual Property Enforcement Coordinator Victoria Espinel, and White House CTO Aneesh Chopra were gracious in their post to the White House’s We the People page and urged for the continuance of an open and democratic Internet. In declaring the administration’s opposition to the controversial SOPA and PIPA pirating laws, Schmidt et al called for a serious legislative response, especially one that doesn’t increase opportunities for hackers to further and easily exploit already vulnerable websites. New legislation, they wrote, must ... Access >>>
Premium Content for Free.
New malware threats require new antimalware protection strategy
by Lisa Phifer, Contributor
Attackers are targeting new vectors such as smartphones, social media and cloud services. Enterprises need to up their game.
Tackling SSL vulnerabilities for secure online transactions
by Michael Cobb, Application Security
A rash of CA breaches shows up weaknesses in the SSL infrastructure. Take action to protect your customers and employees.
- New malware threats require new antimalware protection strategy by Lisa Phifer, Contributor
Mobile device protection: Tackling mobile device security risks
by Marcia Savage
Managing mobile device risks tops the list of priorities for security pros this year.
SOPA and PIPA pirating laws lose support in face of opposition
by Robert Westervelt
Security experts say there are better alternatives to copyright protection.
- Mobile device protection: Tackling mobile device security risks by Marcia Savage
Can a computer security researcher go too far?
by Elizabeth Martin
An examination of three cases illustrates that it’s not always a clear case of good vs. evil.
Ranum chat: APT attacks and malware evolution
by Marcus J. Ranum, Contributor
Security expert Marcus Ranum talks with Joel Yonts, a seasoned security executive with a passion for information security research.
Security leaders help squash SOPA, PIPA pirating laws
by Michael S. Mimoso, Editorial Director
Prominent security and Internet thinkers and leaders have become an effective lobby on Capitol Hill and played a big role in squashing SOPA.
- Can a computer security researcher go too far? by Elizabeth Martin
More Premium Content Accessible For Free
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...