Cybersecurity

How to Continue Improving CISPA in the Senate

With last month’s House passage of the Cyber Intelligence Sharing and Protection Act (CISPA), the cybersecurity debate has now moved to the Senate, albeit quietly, as attention in the upper chamber has been intently focused on immigration. This lull in activity presents an opportunity for Senators to take stock of improvements that were made to … Read More >>

Cybersecurity

Sharing Cyber Threat Information: How It Would Work, and Why It Would Help Bolster Security

The Cyber Intelligence Sharing and Protection Act of 2013 (CISPA), which aims to bolster America’s ability to anticipate and defend against cyber-attacks by improving the situational awareness of front-line IT professionals and law enforcement authorities, will be on the House floor this week. So it is worth taking a close look at how the information … Read More >>

Industry

Four Trends to Watch in 2013

There have been a number of important inflection points in the growth and maturation of the global software industry — the extension of copyright law to cover machine-readable code, the birth of the PC, the commercialization of the Internet, and the advent of cloud computing, to name a few. As we enter 2013, the industry … Read More >>

Cloud Computing

The Right Mix of Policies to Promote Cloud Computing

With cloud computing, the opportunity is clear. Public IT cloud revenue will grow to more than $70 billion by 2015. Even more significant, innovation enabled by the cloud will generate more than a trillion dollars in revenue over the next few years according to one estimate, and will create millions of jobs around the world. … Read More >>

Cybersecurity, Global Markets

When “Security” Regulations Overreach

Cybersecurity has justifiably become a front-burner policy concern for governments around the world. But what happens when security regulations are effectively used to bolster the prospects of local firms at the expense of foreign competitors? We are starting to find out, especially in emerging markets, where many governments have recently begun implementing security-related measures that … Read More >>