Access "Cybersecurity bill lacks details"
This article is part of the May 2010 issue of How to watch over your data with effective database activity monitoring
The Rockefeller-Snowe cybersecurity legislation is promising on several fronts, but if you actually plow through the bill's text, you'll find some questionable provisions and parts that beg for clarification. To be sure, the new draft of the Cybersecurity Act of 2010 (S. 773) is an improvement over last year's version, which included an infamous "kill switch" that would give the president the authority to shut down the Internet in the event of a massive cyberattack. The idea went over like a lead balloon and Sen. Jay Rockefeller, who co-sponsored the revised legislation with Sen. Olympia Snowe (R-Maine), was careful to note that it "does not give any new or broader authority to the president." However, it does allow the president to declare a cybersecurity emergency -- without defining what would constitute a cybersecurity emergency. Rockefeller says the legislation is designed to prepare the U.S. for a major cyberattack by providing a framework for private-public sector collaboration. Among other things, the bill would support major new R&D into ... Access >>>
Premium Content for Free.
Database activity monitoring keeps watch over your data
by Adrian Lane, Contributor
Database activity monitoring can help with security and compliance by tracking everything going on in the database.
OWASP Top 10 vulnerabilities list adds risk to equation
OWASP Top 10 vulnerabilities list adds risk to methodology used to categorize coding errors.
- Database activity monitoring keeps watch over your data by Adrian Lane, Contributor
Four steps toward a plan for a career in information security
by Lee Kushner and Mike Murray
Having a long-term goal for a career in information security isn't enough. Here are four key steps for planning for a career in information security.
The real information security risk equation
by Ron Woerner
A simplified information security risk equation helps translate information security risk to users.
Cybersecurity bill lacks details
The Rockefeller-Snowe cybersecurity bill has potential but raises a lot of questions.
- Four steps toward a plan for a career in information security by Lee Kushner and Mike Murray
More Premium Content Accessible For Free
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...
Not only is modern malware getting more prevalent and sophisticated, it's also now focusing on a broader array of targets. Attackers would still love...
IT Decision Center
Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.