Risk
7/6/2010
01:36 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%
Repost This

Senate Seeks White House Help On Cybersecurity Bill

In a letter to Obama, key senators have asked for administration support in crafting comprehensive cybersecurity legislation.

The Senate is continuing to push forward with plans to develop comprehensive cybersecurity legislation, with seven key senators last week writing a letter to President Obama seeking White House support in crafting a bill.

The Senate has recently begun ramping up efforts to combine its disparate cybersecurity legislative efforts into a single, comprehensive bill in an effort led by Senate majority leader Harry Reid, D-Nev., while the public profile of Senate efforts has also increased, sparked by concerns about privacy and the extent of Presidential power over the Internet.

"Executive branch leadership is key to the nation's cybersecurity and we are eager to hear your views on the optimal organizational structure, necessary updates and reforms to legislation and regulations governing communications networks and information systems, and additional authorities needed to facilitate effective government leadership and response to cyber threats and vulnerabilities," the letter said.

The letter's signatories themselves may indicate a bit about Sen. Reid's strategy for getting legislation passed, as the six other senators signing the letter are all chairmen of committees likely to have an interest in any cybersecurity legislation: Armed Services Committee chairman Carl Levin, D-Mich; Commerce, Science and Transportation Committee chairman Jay Rockefeller, D-W.Va.; Select Committee on Intelligence chairwoman Dianne Feinstein, D-Calif.; Judiciary Committee chairman Patrick Leahy, D-Vt.; Foreign Relations Chairman John Kerry, D-Mass.; and Homeland Security and Government Affairs chairman Joseph Lieberman, I-Conn.

The letter itself give any sense of timing for a comprehensive bill. However, Lieberman and Senate staffers have said that Reid wants a bill passed sometime this year.

While Reid has taken command of the issue in the Senate, the comprehensive strategy in the House of Representatives is less clear. The House has actually passed cybersecurity legislation this session, including some language in a military appropriations bill and a cybersecurity research and development bill, though senior lawmakers on the House Homeland Security Committee have expressed support for a Senate bill recently offered by Lieberman, Susan Collins, R-Maine, and Thomas Carper, D-Del.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2008-3277
Published: 2014-04-15
Untrusted search path vulnerability in a certain Red Hat build script for the ibmssh executable in ibutils packages before ibutils-1.5.7-2.el6 in Red Hat Enterprise Linux (RHEL) 6 and ibutils-1.2-11.2.el5 in Red Hat Enterprise Linux (RHEL) 5 allows local users to gain privileges via a Trojan Horse p...

CVE-2010-2236
Published: 2014-04-15
The monitoring probe display in spacewalk-java before 2.1.148-1 and Red Hat Network (RHN) Satellite 4.0.0 through 4.2.0 and 5.1.0 through 5.3.0, and Proxy 5.3.0, allows remote authenticated users with permissions to administer monitoring probes to execute arbitrary code via unspecified vectors, rela...

CVE-2011-3628
Published: 2014-04-15
Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubuntu 10.10, before 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and before 0.99.7.1-5ubuntu6.5 on Ubuntu 8.0...

CVE-2012-0214
Published: 2014-04-15
The pkgAcqMetaClearSig::Failed method in apt-pkg/acquire-item.cc in Advanced Package Tool (APT) 0.8.11 through 0.8.15.10 and 0.8.16 before 0.8.16~exp13, when updating from repositories that use InRelease files, allows man-in-the-middle attackers to install arbitrary packages by preventing a user fro...

CVE-2013-4768
Published: 2014-04-15
The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB).

Best of the Web