Archive for the ‘Cybersecurity’ Category

A Positive Step in the Encryption Debate

posted by in Cybersecurity, Privacy December 21, 2016

The members of the House Encryption Working Group took on a seemingly impossible task this year when they set out to bridge the gap between the two sides of this noisy and difficult debate. That makes the result of their work – a series of balanced findings that summarizes their careful consideration of these issues – that much more important.

All sides should thank them for it, and we should pledge to work together toward responsible solutions in the next Congress.

As the Working Group notes, encryption plays a crucial role in securing the data of all Americans in our increasingly digital lives. Legislative mandates that undermine the technology would only serve to make everyone less secure. At the same time, the report recognizes – and BSA strongly supports – the important work of law enforcement in protecting our safety and pursuing criminals. To help investigators and prosecutors do their jobs, it will be important to examine new efforts at cooperation between law enforcement and the technology community and to consider new investigative tools and techniques.

The Working Group’s report is the culmination of months’ worth of work by a bipartisan group from the Energy and Commerce Judiciary committees. BSA appreciates their efforts, and we urge Congress to build on the Working Group’s thoughtful report by engaging in a broad dialogue that continues to examine all facets of the encryption debate.

We shouldn’t understate the difficult path that lies ahead. Addressing these concerns while maintaining the greatest possible security will not be an easy task. But with all sides working together, we can develop policies that ensure users the strongest possible digital security and provide law enforcement with the tools they need to keep us safe. BSA looks forward to working with Congress to finding workable solutions that protect security for everyone.

It’s Time to Move the Encryption Discussion Forward

posted by in Cybersecurity, Data, Privacy November 15, 2016

Encryption Principles Art
The encryption discussion in Washington has been locked in a polarized stalemate for months — with loud voices on distant ends deeply dug in.

Encryption is a complex issue that affects a range of global stakeholders, from governments to businesses to individuals. The ideal solution needs to consider all legitimate sides of the argument and can only be achieved through open dialogue. It is time for this stalemate to end.

To move the conversation forward, BSA | The Software Alliance has developed a set of Encryption Principles, to be used by governments around the world to evaluate proposals on encryption in a balanced way. These principles frame a comprehensive approach to address the important needs of global cybersecurity, public safety, and personal privacy and prosperity.
(more…)

Encryption: Securing Our Data, Securing Our Lives

posted by in Cybersecurity, Data June 1, 2016

Encryption impacts our daily lives from the moment we get up in the morning to the moment we fall asleep. When we log into work from home, use a credit card to pay for lunch, or just text a friend, encryption is keeping our data secure. Encryption is also keeping us safe by protecting critical infrastructure and the information that moves across national security networks.

There is an important debate going on around the country — and around the world — about the importance of strong cybersecurity, which relies on encryption, and the legitimate needs of law enforcement to access encrypted data. The conversation has, at times, been heated. When discussions get heated, facts often get left behind.

(more…)

New BSA Survey: Organizations Can Combat Cyberattacks by Avoiding Unlicensed Software

BSA GSS 2016Organizations worried by the ever-increasing threat of cyberattacks should start by looking inward. One of the first, critical steps an organization needs to take is to ensure that all of the software running on its own network is legitimate and fully licensed.

Doing so matters, as highlighted in Seizing Opportunity Through License Compliance, this year’s Global Software Survey from BSA | The Software Alliance. As that study demonstrates, use of unlicensed software is strongly linked to the introduction of malware and all of its dangers.  And once into a network, cybercriminals and malicious hacking can do significant harm.

(more…)

Is It Time to Pop the Champagne for ECPA?

posted by in Cybersecurity, Data, Privacy April 26, 2016

It generally isn’t a good idea to celebrate before a vote in Congress. But it also isn’t generally the case that the House is voting on a measure that is sponsored by nearly three-quarters of its Members. That is the situation this week, with a vote coming on the Email Privacy Act — a bill sponsored by a staggering 314 Representatives.

And those circumstances are why this time perhaps it’s worth celebrating — just a bit — this big step for privacy even before votes are cast.
(more…)

A Call for Creative Solutions

posted by in Cybersecurity, Privacy November 24, 2015

The November 13 attacks in Paris were tragic, and our hearts and thoughts are with the people of Paris. We stand ready to work with law enforcement to prevent future such horrific incidents. Such efforts will require creative solutions that benefit public safety as well as online security.

There has been a good deal of discussion in recent days suggesting that encryption is the single factor that enables terrorists. That is not the case.

(more…)

Effective Information Sharing Legislation Needed to Combat Cyber Attacks

posted by in Cybersecurity July 22, 2015

It’s not hard today to find news accounts of how America’s digital networks are under siege.  Cyber criminals are at work, hoping to extract valuable data from consumers, businesses, and government organizations and to shut down or disrupt our critical infrastructure. One way to combat these attacks is allowing businesses and the government to share information about possible cyber threats in order to more effectively respond.  Unfortunately, current legal barriers discourage collaboration, putting more consumer data and our most critical infrastructure in harm’s way.

To spur action on this front, I sent a letter on behalf of BSA | The Software Alliance to Senate leadership, encouraging them to take up cyber threat information sharing legislation that will help both businesses and government combat cyber threats.
(more…)

Accepting Director Comey’s Call for a Public Debate on Encryption

posted by in Cybersecurity, Privacy July 8, 2015

FBI Director James Comey published a column on July 6, 2015, calling for a robust public debate about the benefits and costs of strong encryption that protects users’ privacy and overall network security. I join Director Comey in that call.

The law enforcement community has raised legitimate concerns about their ability to access information stored electronically.  Our member companies are fully committed to the important mission of law enforcement in keeping Americans safe and investigating criminal activity, and stand ready to do their part. But companies need both clarity about their obligations and the freedom to innovate to meet users’ demands. And we need to ensure that responsibilities imposed on technology companies do not endanger the security of our users’ information, or endanger network security more broadly.
(more…)

The State of Cybersecurity in APAC

posted by in Cybersecurity June 30, 2015

News of cyber attacks dominate today’s headlines. No country is safe from malicious cyber actors. In a world where cyber threats are constant, it is important to understand both how governments are addressing cybersecurity challenges and steps they can take to do better.

Today, BSA | The Software Alliance released its first Asia-Pacific (APAC) Cybersecurity Dashboard, an in-depth study of 10 APAC markets and their approaches to cybersecurity. Our goal is to inspire government leaders in each market to prioritize cybersecurity as an issue of national importance. This APAC Dashboard  is a companion to the European Union Cybersecurity Dashboard, released by BSA earlier this year.

The Dashboard’s findings are clear: the 10 markets examined in APAC have been slow to produce comprehensive national cybersecurity strategies and implement the legal frameworks needed for security and critical infrastructure protection. Yet there are tremendous opportunities to improve the systems needed to protect against, prevent, mitigate, and respond to cyber attacks.  Doing so will bolster enterprise, government, and consumer confidence in cutting edge Internet-enabled technologies and services, driving economic growth and productivity, and will reduce the costs and risks associated with growing cyber threats.
(more…)

Time for Congress to Act on Cyber Threat Information Sharing

posted by in Cybersecurity April 21, 2015

Both public and private sector entities fall victim to cyber criminals and other malicious actors each day. Sharing information about cyber threats is critical to prevent and combat these attacks.

Over the past several years, Congress and the courts have taken steps to clarify and promote information sharing. Last year, the Department of Justice and Federal Trade Commission provided guidance clarifying that private entities can share cyber threat information without raising antitrust concerns — helping to pave the way for more timely cyber threat information sharing. That was a helpful step but there is more that can be done.
(more…)