Cybersecurity

A Cybersecurity Agenda for the Connected Age: One Year Later

One year ago today, BSA | The Software Alliance released a new policy agenda for cybersecurity. A few months before this release, organizations around the world were shook by NotPetya, a malware attack that crippled government, critical infrastructure, and business entities. The incident resulted in more than $10 billion in total losses to the global … Read More >>

Industry

BSA Celebrates 30 Years and Honors 2018 Software Champions

Last night, we celebrated BSA’s 30th Anniversary by honoring Sens. Todd Young and Maria Cantwell and Reps. Doug Collins and Hakeem Jeffries as BSA’s 2018 Software Champions during a reception at the US Capitol. Each of these members has worked diligently for issues that matter to the software industry, including driving a constructive discussion about … Read More >>

Global Markets, Industry, Intellectual Property

Copyright Proposal Threatens to Undermine Europe’s AI Ambitions

Next week, the European Parliament plenary will vote on one of its most controversial files to date – the Copyright Directive. The new legislation touches upon a number of thorny issues that have been the subject of intense debate, yet its Article 3 – aiming to regulate Text and Data Mining (TDM) – is often … Read More >>

Cloud Computing, Data, Global Markets, Privacy

As AI Grows, Privacy, Security, and Global Data Flows Are Key to Innovation, BSA Tells FTC

The Federal Trade Commission’s (FTC) policy and enforcement priorities have a significant impact on the digital economy – and the development of cutting-edge software tools, such as artificial intelligence. The agency has a long track record of evaluating its policy and enforcement approaches, including its 1995 hearings on competition and consumer protection; its pre-centennial global … Read More >>

Cybersecurity, Data, Global Markets, Industry

Tech and Law Enforcement Should Deepen Cooperation to Fight Crime

Debate about law enforcement’s ability to access encrypted devices and communications remains a stalemate. Law enforcement leaders continue to insist on the need for extraordinary access to encryption in criminal investigations; technology experts note that such an approach would bring untenable risks to the security and privacy of individuals, businesses, and critical infrastructure. While this … Read More >>