Industry groups question regulations in cybersecurity bill

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

Industry groups question regulations in cybersecurity bill


Industry groups question regulations in cybersecurity bill

Posted: 02 Apr 2010 09:00 AM PDT


A U.S. Senate committee has dropped some of the most controversial pieces of a wide-ranging cybersecurity bill that had been stalled for nearly a year, but some tech industry groups still have concerns about new regulations that the legislation would create for some companies.

Mozilla beats Apple, Microsoft to Pwn2Own patch punch

Posted: 02 Apr 2010 09:00 AM PDT


Mozilla late yesterday patched a critical Firefox vulnerability used by a German researcher to win $10,000 for hacking the open-source browser at last week's Pwn2Own contest.

You don't know tech: The InfoWorld news quiz

Posted: 02 Apr 2010 09:00 AM PDT


Net hoaxes abound; iPad makes reviewers glad

Maley Mayhem: Was Firing Justified? Five Perspectives

Posted: 02 Apr 2010 09:00 AM PDT


Pennsylvania CISO Robert Maley was fired for talking about a security incident during the recent RSA conference without approval from his bosses. Since then, he has been described as everything from a martyr in the cause of full disclosure to a careless exec who should have known better.

Senators ramp up cyberwar rhetoric

Posted: 02 Apr 2010 09:00 AM PDT


Two U.S. senators urged the country to prepare for a cyberwar in an editorial that is likely to further dismay those who favor toning down the rhetoric stemming from the recent attacks against Google.

Cloud security: The good, bad and ugly

Posted: 02 Apr 2010 09:00 AM PDT


While vendors work to address enterprise concerns about cloud computing security, experts warn there's no easy fix. Meanwhile, cloud service outages and criminals operating in the cloud threaten enterprise acceptance of the utility computing model.

0 comments:

Post a Comment