• The Heritage Network
    • Resize:
    • A
    • A
    • A
  • Donate
  • cyber

    Israel's Investments in Cyber Defense Pay Off

    Following the start of Israeli air strikes against Hamas, hacker groups, including Anonymous, have declared open season on Israeli cyber defenses. However, Israel has invested heavily in cybersecurity and cyber operations, allowing it to defeat more than 44 million hacking attempts on government websites, losing only one website for about … More

    Cybersecurity Act of 2012 Defeated, but a Similarly Flawed Executive Order Is Around the Corner

    Last night, the Cybersecurity Act of 2012 (CSA) failed to pass the U.S. Senate. The vote is already being portrayed as Republican obstructionism, even though five Democrats voted against the bill and four Republicans voted for it. Such rhetoric is being used to justify a cybersecurity executive order that mimics … More

    Morning Bell: Do You Trust the Government with Your Computer?

    Do you trust the federal government to keep your personal data safe? What about your business’s records and trade secrets? If you answered “no,” you have good reason—the federal government has had 13 breaches and failures of its own cybersecurity just in the last six months. Yet the President and … More

    Cybersecurity Act of 2012 Is Back, but Same Problems and Questions Remain

    Senate majority leader Harry Reid (D–NV) has vowed to bring the Cybersecurity Act of 2012 (CSA) up for a vote in the lame-duck session, and it looks as though the vote could take place this week. The CSA uses a standards and regulatory approach to cybersecurity, but many troubling questions … More

    Cybersecurity Executive Order Touts More Regulation as the Solution

    As if the flood of regulations coming after the election weren’t bad enough, a draft of the newest cybersecurity executive order obtained by Heritage reveals that even more regulations are coming. This draft executive order is similar to the failed Cybersecurity Act of 2012 in that it proposes additional regulations … More

    Cybersecurity Flaws at Department of Labor Continue the Trend of Government Cyber Failures

    A recent investigation into the Department of Labor’s (DOL) secure information systems revealed “very serious” cybersecurity flaws. Together with many other cybersecurity breaches and failures in the federal government, it is clear the government should not be put in charge of cybersecurity regulation of the private sector. The DOL failures … More

    Note to Senator Reid: Cybersecurity Differences Are About Policy, Not Politics

    Senate Majority Leader Harry Reid (D–NV) recently promised to bring cybersecurity legislation back to the Senate floor during the lame-duck session of Congress. He also praised President Obama’s draft of a cybersecurity executive order while blaming “Republicans engaging in Tea Party-motivated obstruction” for the Senate’s failure to pass the Cybersecurity … More

    Facing Today's Sputniks

    Fifty-five years ago, America got a huge shock. The Soviets beat us to space with the launch of Sputnik 1 on October 4, 1957. Instead of curling up in a corner and wondering if it meant the end of America’s era of dominance, the leaders of the United States began … More

    Obama's Next Executive Order: Planning for the Sake of Planning Not the Answer

    In the world of cybersecurity, all eyes are on the White House as experts speculate on President Obama’s plans to issue an executive order to secure the cyber sector by administrative fiat. Yet, according to drafts circulating Washington, Obama’s executive order wouldn’t be focused on cybersecurity alone. Instead, the Administration’s … More

    Congressional Cybersecurity Funding Clarified

    In an Issue Brief published yesterday, Heritage raised some questions about the wording of funding language in the continuing resolution (CR) pending before the House of Representatives that might permit President Obama to fund the implementation of his proposed cybersecurity executive order, instead of more clearly necessary and appropriate activities, … More