Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

6/30/2010
11:13 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Chem Industry Commends Senate On Critical Cyberspace Security Action

Homeland Security Committee approves legislation designed to protect nation's cyberinfrastructure

ARLINGTON, VA (June 29, 2010) – The U.S. Senate Homeland Security Committee approved “Protecting Cyberspace as a National Asset Act of 2010,” legislation designed to protect the nation’s critical cyber infrastructure. If enacted, the bill would create an Office of Cyber Policy in the White House, which would lead all federal cyberspace efforts and devise a national cyberspace strategy. It would also create a National Center for Cyber-security and Communications (NCCC) within the Department of Homeland Security, which would enforce cyber-security policies throughout the government and the private sector. Additionally, the bill would establish a public/private partnership to set national cyber-security priorities and improve national cyber-security defenses. The following statement may be attributed to ACC’s senior director of security, Bill Erny:

“We commend Chairman Lieberman, Ranking Member Collins and Senator Carper for their leadership in developing this comprehensive approach to protecting our critical cyber-infrastructure. The bill approved by the Senate Homeland Security Committee will go a long way toward building upon the rigorous security regulations already in place for our industry, while providing a much needed focus on cyber-security.

“We are glad to see that Congress is continuing its commitment to cyber-security, taking it as seriously as our members do. This legislation will complement our members’ ongoing effort to improve cyber-security, from sharing best practices through ACC’s ChemITC forum to implementation of the Responsible Care Security Code'. This bill will also help ensure that similar efforts are being undertaken across the nation’s critical infrastructure, while giving DHS the ability and resources to provide a truly comprehensive approach to securing our cyber- and information systems.

“ACC and our members appreciate the efforts of Sens. Lieberman, Collins and Carper, and the other members of the Senate Homeland Security Committee on this essential cyber-security legislation, which will help us protect our facilities, our employees, the communities where we operate, and the vital products we supply to the nation every day.”

Since 2001, ACC members have led the way in chemical security. Long before there was any government direction, ACC member companies invested more than $8 billion on enhancing facility security under ACC’s Responsible Care Security Code, which has since become the gold standard for the industry and a model for regulatory programs.

# # # www.americanchemistry.com/newsroom

The American Chemistry Council (ACC) represents the leading companies engaged in the business of chemistry. ACC members apply the science of chemistry to make innovative products and services that make people's lives better, healthier and safer. ACC is committed to improved environmental, health and safety performance through Responsible Care', common sense advocacy designed to address major public policy issues, and health and environmental research and product testing. The business of chemistry is a $674 billion enterprise and a key element of the nation's economy. It is one of the nation’s largest exporters, accounting for ten cents out of every dollar in U.S. exports. Chemistry companies are among the largest investors in research and development. Safety and security have always been primary concerns of ACC members, and they have intensified their efforts, working closely with government agencies to improve security and to defend against any threat to the nation’s critical infrastructure.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5423
PUBLISHED: 2020-12-02
CAPI (Cloud Controller) versions prior to 1.101.0 are vulnerable to a denial-of-service attack in which an unauthenticated malicious attacker can send specially-crafted YAML files to certain endpoints, causing the YAML parser to consume excessive CPU and RAM.
CVE-2020-29454
PUBLISHED: 2020-12-02
Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access.
CVE-2020-7199
PUBLISHED: 2020-12-02
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access,...
CVE-2020-14260
PUBLISHED: 2020-12-02
HCL Domino is susceptible to a Buffer Overflow vulnerability in DXL due to improper validation of user input. A successful exploit could enable an attacker to crash Domino or execute attacker-controlled code on the server system.
CVE-2020-14305
PUBLISHED: 2020-12-02
An out-of-bounds memory write flaw was found in how the Linux kernel’s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat ...