• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Articles / News / Cyber-Security Getting More Attention From Obama Administration, Other Gov’t Officials

Cyber-Security Getting More Attention From Obama Administration, Other Gov’t Officials

2011-05-13 by Jason

Yesterday afternoon, the Obama administration passed along a legislative proposal to Congress on the topic of cyber-security. With plenty of recent press coverage, cyber-security is getting plenty of attention following Epsilon, Sony, and far too many other data breaches. The President’s administration is responding to a Congressional call on how to best legislate the nation’s cyber-security needs.

The President’s proposal (.pdf) includes three main points, stressing the importance of cyber-security to the United States. Taking the highlights from the announcement article on WhiteHouse.gov:

  1. The Administration proposal helps safeguard your personal data and enhances your right to know when it has been compromised.
  2. It helps protect our national security by addressing threats to our power grids, water systems, and other critical infrastructure.
  3. It helps the U.S. government protect our federal networks, while creating stronger privacy and civil liberties protections that keep pace with technology.

With everything from Sony’s breach to WikiLeaks to Anonymous DDoSing major corporations to China hacking Google, other corporations, and military contractors, the US government needs to be up to speed and taking a pro-active approach to cyber-security threats. As we saw in the war game played last February, Cyber Shockwave, with a cyber attack as the central theme – we lost and lost hard.

For more information on the President’s cyber-security proposal, you can read the Cyber-security proposal fact sheet or read the letters regarding the proposal (go to May 12th) directed to the Department of Homeland Security, House of Representatives, and Senate which includes law enforcement provisions, data breach notification, regulatory framework, and the complete cyber-security proposal (.pdf). The administration would also like to point out its cyber-security accomplishments (.pdf) as well.

In other related news, former Homeland Security Secretary Michael Chertoff and FCC chairman Julius Genachowski will be participating in a roundtable discussion on cyber-security along with representatives from Symantec and McAfee on Monday. If anything significant comes out of this discussion, more on that next week.

Filed Under: News, Security and Privacy

Trending

  • McAfee Artemis/GTI False Positive thrashing files
    In Security and Privacy, Software
  • Byte-dock, A New Docking Station For The Mac Book Pro
    In Hardware, Gadgets, and Products
  • Google Chromebooks Go On Sale Today But Only One Shows Up
    In Hardware, Gadgets, and Products, Media, News

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • How to ‘Unblock’ multiple files at a time with PowerShell How to 'Unblock' multiple files at a time with PowerShell
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • Command line to take ownership and change permissions Command line to take ownership and change permissions
  • Creating and editing views in phpMyAdmin Creating and editing views in phpMyAdmin
  • Read the Event Logs on Windows Server Core Read the Event Logs on Windows Server Core
  • How to Purchase Cryptocurrencies? How to Purchase Cryptocurrencies?
  • Top 6 necessary aspects to consider when hiring Angular developers Top 6 necessary aspects to consider when hiring Angular developers
  • Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business
  • Benefits of End-To-End Testing That Will Match Company Expectations Benefits of End-To-End Testing That Will Match Company Expectations
  • 3 Key Features of Pets Health Monitoring Systems 3 Key Features of Pets Health Monitoring Systems
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • How to Purchase Cryptocurrencies?
  • Top 6 necessary aspects to consider when hiring Angular developers
  • Full guide on drawbacks and benefits of Node.js for making the perfect choice for your business

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2023 · Magazine Pro Theme on Genesis Framework · WordPress · Log in