Today a bipartisan group of lawmakers introduced in both the House and Senate a bill that would formalize the Vulnerability Equities Process (VEP) into law.
Latest in Cybersecurity: Legislation
Bobby Chesney raised a number of issues regarding the Active Defense Certainty Act, and I’m just getting into it now. I think Bobby’s comments are spot on, but I want to amplify some of his concerns.
Some thoughts on Representative Tom Graves's discussion draft of a bill that would create a defense to liability under the Computer Fraud and Abuse Act (CFAA) (18 USC 1030) for “active cyber defense measures."
Russia sanctions legislation has been introduced in both houses of Congress. Here's a breakdown of the two leading bills.
A reminder that Congress can exert significant power when it comes to the roles, responsibilities, and authorities of executive branch agencies. That includes the Department of Defense's approach to military cyber operations.
Why is cybersecurity so hard for the Federal government? Sometimes its just old ways of thinking and acting that resist updating. Case in point—the FLRA's determination that agencies may not restrict access to external emails without permission from the employees' union.
Legally speaking, there’s no such thing. But sextortion turns out to be remarkably common. A great many sextortion cases have taken place―in federal courts, in state courts, and internationally―over a relatively short span of time, and they involve what are effectively online, remote sexual assaults, sometimes over great distances, sometimes even crossing international borders, and sometimes involving a great many victims.
This morning, Benjamin Wittes hosted an online webcast previewing two new studies on "sextortion," a new form of remote sexual assault.
Senators Richard Burr and Dianne Feinstein release the Compliance with Court Orders Act of 2016.