• The Heritage Network
    • Resize:
    • A
    • A
    • A
  • Donate
  • cybersecurity

    Cyber Command Expansion Threatened by Budget Cuts

    The Pentagon has approved a 500 percent personnel increase for Cyber Command—which protects the Pentagon’s information networks and engages in cyberspace operations—according to The Washington Post. In a world where cyber is becoming an increasingly important realm, few would disagree with the U.S. government’s desire for increased cyber capabilities. However, … More

    John Kerry at State Department: Good for Obama, Not America

    The good news for the Obama Administration is that its next Secretary of State, Senator John Kerry (D–MA), had the smoothest of sailing during yesterday’s Senate confirmation hearing. Indeed, the nominees for Secretary of Defense, Chuck Hagel, and Director of the CIA, John Brennan, should be so lucky. The only … More

    Businesses Agree: Regulation Is the Wrong Approach to Cybersecurity

    A new report by the Business Roundtable (BRT) affirms what Heritage analysts and other experts have been saying for years: Cybersecurity is best enhanced by information sharing, not more regulation. Indeed, it was because of disagreements over a regulatory approach that cybersecurity efforts failed in the last Congress. The new … More

    Morning Bell: The Danger of International Internet Regulation

    Regulating the Internet is something Americans have resisted here at home. Now that fight is going global. The United Nations—of course—has an agency that oversees international telecommunications. The International Telecommunications Union (ITU) was founded in 1865, when the telegraph was its main concern. Now it’s trying to expand its influence … More

    Israel's Investments in Cyber Defense Pay Off

    Following the start of Israeli air strikes against Hamas, hacker groups, including Anonymous, have declared open season on Israeli cyber defenses. However, Israel has invested heavily in cybersecurity and cyber operations, allowing it to defeat more than 44 million hacking attempts on government websites, losing only one website for about … More

    Cybersecurity Act of 2012 Defeated, but a Similarly Flawed Executive Order Is Around the Corner

    Last night, the Cybersecurity Act of 2012 (CSA) failed to pass the U.S. Senate. The vote is already being portrayed as Republican obstructionism, even though five Democrats voted against the bill and four Republicans voted for it. Such rhetoric is being used to justify a cybersecurity executive order that mimics … More

    Morning Bell: Do You Trust the Government with Your Computer?

    Do you trust the federal government to keep your personal data safe? What about your business’s records and trade secrets? If you answered “no,” you have good reason—the federal government has had 13 breaches and failures of its own cybersecurity just in the last six months. Yet the President and … More

    Cybersecurity Act of 2012 Is Back, but Same Problems and Questions Remain

    Senate majority leader Harry Reid (D–NV) has vowed to bring the Cybersecurity Act of 2012 (CSA) up for a vote in the lame-duck session, and it looks as though the vote could take place this week. The CSA uses a standards and regulatory approach to cybersecurity, but many troubling questions … More

    Morning Bell: The Threats of a Lame Duck Congress

    The lame-duck session begins today, with retiring and defeated Members of Congress coming back to Washington to make their last legislative decisions. Because of the lack of accountability to voters, the lame-duck period brings heightened scrutiny. Congress has 16 working days scheduled between now and the end of the year, … More

    U.S. Can Learn from Canadian Cybersecurity Shortcomings

    In its recently released fall 2012 report, the Office of the Auditor General of Canada (AG) outlined several shortcomings in the country’s efforts to protect critical infrastructure from cyber threats. The report provides specific recommendations for information-sharing policies that the U.S .government should use as it tries to develop U.S. … More