President’s Message
October is National Cyber Security Awareness Month, and there has been a host of activity that has helped promote awareness of the issue and reinforce the need for a federal data security and breach notification law.
Symantec Reports Cyber Criminals Are Becoming Increasingly Professional
The latest Internet Security Threat Report (ISTR), Volume XII released in September by CSIA member Symantec Corp. concluded that cyber criminals are increasingly becoming more professional – even commercial – in the development, distribution and use of malicious code and services.
Schwarzenegger Vetoes California Data Breach Bill
On October 14 California Governor Arnold Schwarzenegger vetoed legislation, AB 779, which would have made state retailers financially liable for the costs incurred by financial institutions because of retail data breaches. CSIA did not take a position on the measure.
U.S. Cyber Security Briefs
New Senate Bill Focuses on Identify Theft
Bill Sought to Shield Medical Data
Threats to Power Facilities on the Rise
Cyber Wars
GTISC Releases Emerging Cyber Threats Forecast
Panelists Cite Threats to U.S. Computer Networks
PCI and Other Breach Laws Under Assault
Survey Finds Gap Between Perceived and Actual IT Security
Letter from the Director of European Affairs
E.U. Constitution “no”, but E.U. Treaty “yes?” On 18-19 October, E.U. leaders met in Lisbon, Portugal, for an Informal Council meeting to agree to the final text of the new E.U. Treaty. After voters in France and the Netherlands said “no” to the proposed E.U. Constitution, E.U. Member States toned down their ambition by removing controversial parts such as the label “constitution” and references to the symbols and the anthem of the E.U.
European Commission Promotes Public-Private Dialogue in Security Research
As part of its objective to develop a long term perspective on European security research, the European Commission created in 2004 a “Group of Personalities”, composed of high level industrialists, members of the European Parliament, and representatives of international organisations and research institutes, chaired by then Commissioners Philippe Busquin and Erkki Liikanen.
E.U. and Global Cyber Security Briefs
West Is Taking Fight Against Terrorism Online
Personal Data Protection Under Threat in EU Treaty Draft
Europe':s Concern Over UK Data Protection ':Defects': Revealed
European Data Protection Supervisor Concerned for Data Protection Standards
Global Cybersecurity Roadmap Unfolds
Privacy Threats Are No Longer 'Terra Incognita'
The Lesson of Estonia
Cyber Security Corner: Security and Regulatory Compliance Technologies Need to Converge
Philippe Courtot, Chairman and CEO of Qualys
For too long, companies have been forced to spread their IT departments thin in order to maintain secure IT systems and comply with government and industry regulations, whether that be Sarbanes-Oxley, SB 1386, GLBA, or others.
CSIA Congressional Spotlight
CSIA Congressional Spotlight: Representative Jim Langevin (D-RI)
In addition to his Homeland Security work, one of Langevin's top priorities has been advancing the science of stem cell research. He championed the passage of H.R. 3, the Stem Cell Research Enhancement Act, and its predecessor H.R. 810, which call for the expansion of the federal policy on embryonic stem cell research.
A Conversation with Representative Jim Langevin
How did you become interested in cyber security issues?
Jim Langevin (JL): As a person with a disability, I have always had a keen interest
in technology and how it can improve our lives. In Congress, my understanding of technology's
importance to our nation's public and private infrastructure has grown tremendously.
CSIA Member Spotlight
CSIA Member Spotlight: Application Security, Inc.
About Application Security, Inc.: Application Security, Inc. (www.appsecinc.com) is the leading global provider of database security solutions for the enterprise.
It's About the Database, Stupid!!!
Thom VanHorn, Application Security, Inc.
Organizations have an obligation to secure the repository of their most valuable assets. To protect data and consumer trust, corporations must move quickly to extend proven security best practices to the database.