Cybersecurity National Security

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

The War Against Cyber Threats: President Obama Ups the Ante

Focusing on overseas cyber threats, President Obama issued an Executive Order on April 1, 2015, which grants authorization to impose sanctions on individuals and entities engaged "in malicious cyber-enabled activities that...more

New Executive Order Allows for Sanctions Related to Cybersecurity

On April 1, 2015, President Obama issued a groundbreaking Executive Order (E.O.) enabling the United States to sanction persons that have (1) participated in malicious cyber-enabled activities constituting a “significant...more

New US sanctions program to combat cybercrimes: 3 action steps for tech companies

The new sanctions in President Barack Obama’s Executive Order 13694 of April 1, 2015, “Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities,” target individuals and...more

Cybersecurity Update: U.S. Sanctions on the Horizon for Malicious Cyber-Attackers

Executive Order 13694 is the Obama Administration’s latest tool to combat cybersecurity threats. On April 1, 2015, President Obama declared a national emergency to address the “increasing prevalence and severity of malicious...more

United States Goes on the Offensive Against International Cybercrime - 2015 Cybersecurity Executive Order

On April 1, President Obama signed an Executive Order to combat the "national emergency" sparked by a rapidly evolving global cybercrime environment. The Executive Order directs the U.S. Treasury Department to impose...more

New Executive Order Authorizes Economic Sanctions to Combat Malicious Cyber Activity

Calling cyber threats “one of the most serious economic and national security challenges to the United States” and declaring a national emergency relating to those threats, on April 1, 2015, President Obama issued an...more

President Obama Signs Executive Order Authorizing Sanctions In Response To Malicious Cyber Activity

On April 1, 2015, President Obama signed an executive order authorizing the first sanctions program to combat malicious cyber activity. The order permits the U.S. Department of the Treasury to freeze the assets of...more

Obama Executive Order Targets International Cyberattacks Against U.S. with New Sanctions

As part of a series of measures aimed at increasing preparedness and defenses against international cyberattacks on U.S. industries and government agencies, on April 1, President Obama issued Executive Order No. 13694,...more

Now's the Time to Review Your OFAC Compliance Program

Obama Executive Order Targets International Cyberattacks Against U.S. with New Sanctions - New Sanctions Are Part of U.S. Escalation of Efforts to Bolster Cyber-Security: As part of a series of measures aimed at...more

Obama Administration Recognizes Cyber Threats to U.S. Critical Infrastructure as a National Emergency

Many cybersecurity experts have warned that the United States is already engaged in covert cyber warfare against hostile actors around the world. The latest cybersecurity Executive Order reflects formal recognition that,...more

Executive Order Blocks Property of Those Engaging in Malicious Cyber Activities

The executive order enables US government agencies to block the assets of any foreign person determined to have engaged in malicious cyber-enabled activities....more

U.S. Authorizes Targeted Sanctions Against Overseas Cyber Threats

Cyber threats are one of the U.S.’s top security threats. In just the past year, there has been a significant increase in the frequency, scale and sophistication of cyber intrusions and attacks – many of them originating...more

EUROPE: EU-US data flows at risk? European Court of Justice today heard Facebook case.

Yesterday, the Schrems v. Irish Data Protection Commission case was brought before the Court of Justice of the European Union (‘CJEU’) for an oral hearing, following referral by the Irish High Court. While the final ruling by...more

President Obama Acknowledges Growing Cybersecurity Threats to the Government and Economy, Proposes New Measures to Fight Cyber...

Just days after news broke that ISIS hackers forced the shutdown of the U.S. Central Command’s Twitter account, President Obama met with congressional leadership, members of the Federal Trade Commission and the Department of...more

The First Law of International Dynamics: Sanctions May Be Transformed But Never Created or Destroyed

U.S. economic sanctions, by their nature, often change without warning. Since sanctions reflect U.S. foreign and national security policy, they must evolve rapidly with world events. Often, it seems that when one door is...more

Cybersecurity…At Least There Is One Thing Congress Can Agree On

While most political observers were focused last week on the debates surrounding passage of the so-called “Cromnibus” spending bill, less noted was the fact that the U.S. Congress managed to pass a number of cyber-security...more

Cybersecurity Activity During Last Gasp of Lame-Duck Congress

This week, there has been a flurry of last-minute action on various cybersecurity items in both the House and Senate. Much of the legislative activity involved modest adjustments to, or confirmation of, the authority or...more

Senate Intelligence Committee Approves Cybersecurity Bill

The Senate Intelligence Committee on June 8th voted 12-3 to approve a cybersecurity bill authored by Senate Intelligence Committee Chairman Dianne Feinstein (D-CA) and Vice Chairman Saxby Chambliss (R-GA). S. 2588, the...more

DOD Issues Interim Rule on Supply Chain Security

On November 18, 2013, the U.S. Department of Defense (DOD) published an interim rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) that will likely prove controversial through the inclusion of supply...more

U.S. Responding To Cyber-Espionage: White House Acknowledges Increasing Threat

No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more

How to Protect Your Company From Hackers [Video]

March 8 (Bloomberg Law) -- With reports of corporate espionage and hacking on the rise, the US government and private companies need to take steps to prevent the loss of trade secrets and threats to national security says...more

EPIC Comments on Federal Cybersecurity Plan

In response to a request for comments, EPIC submitted comments on the Federal Cybersecurity Research and Development Strategic Plan. The cybersecurity strategic plan calls for a coordinated research strategy across federal...more

Congressional Committee Finds Huawei And ZTE To Be Threats To National Security By Shannon Doyle

On October 8, 2012, the House Permanent Select Committee on Intelligence (“the Committee”) published a report declaring two Chinese telecommunication equipment manufacturers, Huawei Technologies Company and ZTE, to be threats...more

U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE

Full text copy of "U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE," the House Committee on Intelligence report that found “the risks associated with [Chinese telecom companies]...more

24 Results
|
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×