Risk
7/6/2010
01:36 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Senate Seeks White House Help On Cybersecurity Bill

In a letter to Obama, key senators have asked for administration support in crafting comprehensive cybersecurity legislation.

The Senate is continuing to push forward with plans to develop comprehensive cybersecurity legislation, with seven key senators last week writing a letter to President Obama seeking White House support in crafting a bill.

The Senate has recently begun ramping up efforts to combine its disparate cybersecurity legislative efforts into a single, comprehensive bill in an effort led by Senate majority leader Harry Reid, D-Nev., while the public profile of Senate efforts has also increased, sparked by concerns about privacy and the extent of Presidential power over the Internet.

"Executive branch leadership is key to the nation's cybersecurity and we are eager to hear your views on the optimal organizational structure, necessary updates and reforms to legislation and regulations governing communications networks and information systems, and additional authorities needed to facilitate effective government leadership and response to cyber threats and vulnerabilities," the letter said.

The letter's signatories themselves may indicate a bit about Sen. Reid's strategy for getting legislation passed, as the six other senators signing the letter are all chairmen of committees likely to have an interest in any cybersecurity legislation: Armed Services Committee chairman Carl Levin, D-Mich; Commerce, Science and Transportation Committee chairman Jay Rockefeller, D-W.Va.; Select Committee on Intelligence chairwoman Dianne Feinstein, D-Calif.; Judiciary Committee chairman Patrick Leahy, D-Vt.; Foreign Relations Chairman John Kerry, D-Mass.; and Homeland Security and Government Affairs chairman Joseph Lieberman, I-Conn.

The letter itself give any sense of timing for a comprehensive bill. However, Lieberman and Senate staffers have said that Reid wants a bill passed sometime this year.

While Reid has taken command of the issue in the Senate, the comprehensive strategy in the House of Representatives is less clear. The House has actually passed cybersecurity legislation this session, including some language in a military appropriations bill and a cybersecurity research and development bill, though senior lawmakers on the House Homeland Security Committee have expressed support for a Senate bill recently offered by Lieberman, Susan Collins, R-Maine, and Thomas Carper, D-Del.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7896
Published: 2015-03-03
Multiple cross-site scripting (XSS) vulnerabilities in HP XP P9000 Command View Advanced Edition Software Online Help, as used in HP Device Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Tiered Storage Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Replication Manager 6.x and 7.x before ...

CVE-2014-9283
Published: 2015-03-03
The BestWebSoft Captcha plugin before 4.0.7 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

CVE-2014-9683
Published: 2015-03-03
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

CVE-2015-0656
Published: 2015-03-03
Cross-site scripting (XSS) vulnerability in the login page in Cisco Network Analysis Module (NAM) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCum81269.

CVE-2015-0890
Published: 2015-03-03
The BestWebSoft Google Captcha (aka reCAPTCHA) plugin before 1.13 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.