Compliance and Enforcement, Cybersecurity

Malware Threats from Unlicensed Software: Real or Imagined?

It has long been assumed that there is a connection between unlicensed software and cyber security threats. In fact, BSA’s most recent Global Software Survey found that computer users cite exposure to cybersecurity threats from malware as the chief reason not to use unlicensed software. To test whether this relationship is indeed real or imagined, … Read More >>

Compliance and Enforcement, Cybersecurity

Using Legal Software to Reduce Cyber Vulnerabilities

Earlier this month, BSA member Microsoft partnered with the FBI and law enforcement authorities in more than 80 countries to break up a huge cybercrime ring that had managed to steal an estimated $500 million from bank accounts in the United States, Europe and Hong Kong. The perpetrators carried out their crimes by infecting millions … Read More >>

Cybersecurity

How to Continue Improving CISPA in the Senate

With last month’s House passage of the Cyber Intelligence Sharing and Protection Act (CISPA), the cybersecurity debate has now moved to the Senate, albeit quietly, as attention in the upper chamber has been intently focused on immigration. This lull in activity presents an opportunity for Senators to take stock of improvements that were made to … Read More >>

Cybersecurity

Sharing Cyber Threat Information: How It Would Work, and Why It Would Help Bolster Security

The Cyber Intelligence Sharing and Protection Act of 2013 (CISPA), which aims to bolster America’s ability to anticipate and defend against cyber-attacks by improving the situational awareness of front-line IT professionals and law enforcement authorities, will be on the House floor this week. So it is worth taking a close look at how the information … Read More >>

Cybersecurity, Global Markets

When “Security” Regulations Overreach

Cybersecurity has justifiably become a front-burner policy concern for governments around the world. But what happens when security regulations are effectively used to bolster the prospects of local firms at the expense of foreign competitors? We are starting to find out, especially in emerging markets, where many governments have recently begun implementing security-related measures that … Read More >>