Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity
    • IT Management

    RSA Conference, Cyber-security Legislation Lead IT Security News

    By
    Brian Prince
    -
    February 20, 2011
    Share
    Facebook
    Twitter
    Linkedin

      The past week was a busy one in IT security, with the annual RSA Conference sharing time in the headlines with a controversial cyber-security bill and other news.

      The RSA Conference, held in San Francisco from Feb. 14-18, drew a large crowd of vendors, security researchers and IT professionals. Among the key themes this year were cloud security, advanced persistent threats and cyber-security. Meanwhile, ISC2 used the conference to highlight some of the new demands facing the IT security workforce.

      More can be read about the conference here in our RSA roundup.

      But the biggest news sharing space with the conference during the week was the reintroduction of a controversial cyber-security bill that included language its sponsors hope will kill the “Internet Kill Switch debate.”

      “The so-called ‘Internet kill switch’ debate has eclipsed discussion of actual, substantive provisions in this bill that would significantly improve the security of all Americans by creating a new national center to prevent and respond to cyber-attacks, requiring critical infrastructure owners-for the first time-to shore up cyber-vulnerabilities, and establishing a strategy to secure the federal IT supply chain,” said Sen. Joe Lieberman, I-Conn., in a statement. “I look forward to working with Senator Reid to bring comprehensive cyber-security legislation to the floor early this year.”

      The bill states: “Notwithstanding any provision of this Act, an amendment made by this Act, or section 706 of the Communications Act of 1934 (47 U.S.C. 606), neither the President, the Director of the National Center for Cybersecurity and Communications, or any officer or employee of the United States Government shall have the authority to shut down the Internet.”

      The debate about the concept of an Internet Kill Switch has been brought into focus by the recent events in Egypt, in which the Egyptian government blocked access to the Internet as civil unrest was spreading. A link to the bill can be found here.

      In a speech at George Washington University Feb. 15, U.S. Secretary of State Hillary Clinton outlined a new policy meant to guarantee that dissidents and human rights activists have access to the Internet while justifying recent United States actions on online security and privacy. Naming several countries known to censor the Internet, Clinton said a restricted Internet has economic repercussions on businesses, which may think twice about operating in those areas, as well as effects on what people feel comfortable saying or doing online.

      “The freedoms to assemble and associate also apply in cyberspace,” she said.

      Meanwhile, Microsoft responded to reports of a Windows zero-day bug after proof-of-concept exploit code was posted on the Web. On Feb. 14-Valentine’s Day-an anonymous researcher going by the name “Cupidon-3005” released proof-of-concept code for a Server Message Block (SMB) vulnerability affecting the CIFS (Common Internet File System) browser service. More specifically, the vulnerability resides in an error-reporting function of the CIFS browser service module, explained Matt Oh of the Microsoft Malware Protection Center Vulnerability Response Team.

      “Based on our initial investigation, this vulnerability cannot be leveraged for remote code execution [RCE] on 32-bit platforms,” said Jerry Bryant, group manager of response communications for Microsoft’s Trustworthy Computing Group. “We are still investigating the possibility of code execution on 64-bit platforms, but so far have not found a likely scenario that would result in reliable code execution.”

      Brian Prince

      MOST POPULAR ARTICLES

      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×