Risk
7/6/2010
01:36 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Senate Seeks White House Help On Cybersecurity Bill

In a letter to Obama, key senators have asked for administration support in crafting comprehensive cybersecurity legislation.

The Senate is continuing to push forward with plans to develop comprehensive cybersecurity legislation, with seven key senators last week writing a letter to President Obama seeking White House support in crafting a bill.

The Senate has recently begun ramping up efforts to combine its disparate cybersecurity legislative efforts into a single, comprehensive bill in an effort led by Senate majority leader Harry Reid, D-Nev., while the public profile of Senate efforts has also increased, sparked by concerns about privacy and the extent of Presidential power over the Internet.

"Executive branch leadership is key to the nation's cybersecurity and we are eager to hear your views on the optimal organizational structure, necessary updates and reforms to legislation and regulations governing communications networks and information systems, and additional authorities needed to facilitate effective government leadership and response to cyber threats and vulnerabilities," the letter said.

The letter's signatories themselves may indicate a bit about Sen. Reid's strategy for getting legislation passed, as the six other senators signing the letter are all chairmen of committees likely to have an interest in any cybersecurity legislation: Armed Services Committee chairman Carl Levin, D-Mich; Commerce, Science and Transportation Committee chairman Jay Rockefeller, D-W.Va.; Select Committee on Intelligence chairwoman Dianne Feinstein, D-Calif.; Judiciary Committee chairman Patrick Leahy, D-Vt.; Foreign Relations Chairman John Kerry, D-Mass.; and Homeland Security and Government Affairs chairman Joseph Lieberman, I-Conn.

The letter itself give any sense of timing for a comprehensive bill. However, Lieberman and Senate staffers have said that Reid wants a bill passed sometime this year.

While Reid has taken command of the issue in the Senate, the comprehensive strategy in the House of Representatives is less clear. The House has actually passed cybersecurity legislation this session, including some language in a military appropriations bill and a cybersecurity research and development bill, though senior lawmakers on the House Homeland Security Committee have expressed support for a Senate bill recently offered by Lieberman, Susan Collins, R-Maine, and Thomas Carper, D-Del.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.