Microsoft, Other IT Companies Support Cybersecurity Legislation

The sponsors of comprehensive, bipartisan, risk-based cybersecurity legislation Wednesday thanked Microsoft Corp. and others for supporting the Protecting Cyberspace as a National Asset Act, S. 3480.

Homeland Security and Governmental Affairs Committee Chairman Joe Lieberman, ID-Conn., Ranking Member Susan Collins, R-Me., and Federal Financial Management Subcommittee Chairman Thomas Carper, D-Del., said they were grateful for the support of notable IT players because it provides momentum as the legislation moves forward.

"Our cybersecurity legislation was crafted with precision and care," Lieberman said. "We did our homework. We consulted with a broad spectrum of stakeholders in the field, and we produced a bill that has broad support within the IT industry and the Internet security community.  That support is testament to the strength of our legislation - and to its collaborative approach toward the private sector. I look forward to working with our Senate colleagues to produce a bill for Congress to pass and the President to sign this year."

Collins said: "To create our comprehensive cybersecurity bill, we devoted significant time to solicit and gather multiple stakeholder views from the private sector and from government. We did so to ensure that our legislation would be as effective as possible. Today, support from these major companies and private sector organizations, which are dominant players on the world cyber stage, illustrates the power of that collaboration. The only way that our nation can defend against a debilitating cyber attack is for the private sector and the federal government to work together, in tandem, against this common and virulent enemy. As our bill notes in its title, cyberspace is a national asset, linked to so many critical aspects of daily life in America. We must guard it as such, and that stewardship will require all hands on desk. Our bill creates a true partnership designed to find solutions to the ongoing threat of a national cyber assault."

Carper said: "There's a principle that I have strived to follow since my early days in the House of Representatives and as Governor of the great state of Delaware: 'the government should steer the boat, not row the boat.' That statement is as true today, as it was when I entered government some 30 odd years ago. And it's especially relevant on an issue like cybersecurity which touches every facet of our modern-day society. I want to thank our supporters for taking the time to meet with me and my colleagues over the past few years as we developed this critically important piece of legislation. And to those who are still on the fence with supporting our bill -- or perhaps don't agree with any of it - we still welcome your thoughts, ideas, and participation as we strive to ensure that Congress does it's part to protect one of America's most precious resources, cyberspace."

In a letter to  Lieberman, Collins and Carper, Microsoft managing director for governmental affairs Fred Humphries said: "Your bill, the Protecting Cyberspace as a National Asset Act of 2010 (S. 3480), demonstrates a deep understanding of the challenges that the nation faces in cyberspace, and provides a much needed structure and process to address those issues… If enacted, S. 3480 will help to strengthen the appropriate roles of government in building and implementing a national strategy and also in protecting its own enterprise. We strongly support the intended outcomes of this legislation and key provisions it offers to advance cyber security."

Other industry players have also had positive reaction to the bill:

Verizon Communications Chief Network Security Officer Sara Santarelli said: "Unfunded regulatory mandates and command-and-control type governance must be avoided. The most effective approach, which appears to be the direction that this bill is taking, is a public-private partnership where government provides assistance and expertise to the private sector, coupled with incentives like confidentiality and liability protection to encourage the private sector to implement desired activities and with freedom to take decisive actions."

EMC Corporation and RSA, the Security Division of EMC, Executive Vice President Art Coviello and Chief Security Officer Dave Martin said in a letter: "We thank you for crafting a comprehensive bill that incorporates a risk-based approach to protecting information infrastructure in both the public and private sectors. S. 3480 includes provisions to elevate cyber security in organizations and to enable risk managers in the federal government and covered critical infrastructure sectors, to effectively assess, address, and mitigate cyber security risks to their organizations. We believe that this is the right approach."

Symantec Executive Vice President & Chief Technology Officer Mark Bregman said: "Symantec would like to convey our support for the Protecting Cyberspace as a National Asset Act of 2010. This important legislation will enhance and modernize our nation's overall cybersecurity posture in order to safeguard our critical infrastructure from attack. The bill also importantly recognizes cybersecurity as a shared government and private sector responsibility which requires a coordinated strategy to detect, report and mitigate cyber incidents. We look forward to working with the Committee to help advance this important legislation."

Karen Evans, Former Administrator for E-Government and IT, Office of Management and Budget: "I am really excited about the introduction of this legislation especially as it relates to strengthening the authorities of DHS. It is necessary for the Director of the National Center for Cybersecurity and Communications to have the appropriate authorities to really make a difference and improve the security posture of the federal agencies and critical infrastructure and this bill does exactly that. I am especially excited with the inclusion of the workforce provisions such as the establishment of the cyber talent competitions and challenges. By addressing all aspects of the cybersecurity issue, the passage of this bill will really make a difference in reducing the overall risk to our federal agencies and critical infrastructure."

Featured

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities