Recap of White House Cybersecurity Efforts

Recap of White House Cybersecurity Efforts

Twitter has been abuzz with comments to and from President Obama relating to cybersecurity and how to better digitally protect America against the growing number of cyber-related threats. Here are the ways in which Obama proposes we, America, fight against cyber threats:

  1. Enable cybersecurity information sharing: Encourage the private sector to share cyber threat information with the Department of Homeland Security’s National Cybersecurity and Communications Integration Center (NCCIC) who will in turn share the information as close to real-time as possible to relevant federal agencies.

    In addition, this legislation encourages forming private-sector led Information Sharing and Analysis Organizations to help keep American’s personal data safe by requiring compliance with privacy restrictions.

    This is to complement existing relationships between the government and private sector.

  2. Modernize law enforcement authorities: Allow for the prosecution of the sale of botnets, make the overseas sale of stolen U.S. financial data a criminal offense, allow federal law enforcement to deter the sale of spyware for use of stalking or ID theft, give authority to courts shut down botnets engaged in criminal activity.

  3. National data breach reporting: Simplify and standardize the reporting process for each state that requires consumers to be notified by businesses that suffer intrusions to consumers’ personal information by making this requirement a federal statute.

“Companies that have lost sensitive customer information in a data breach should be legally required to inform their customers,” said Stina Ehrensvard, CEO and founder, Yubico. “This is an important step for continued trust for the Internet, and for the companies that have been affected, as this information will be out on the Internet sooner or later anyway.”

Reporting does seem to help build trust, establishing a “we’re-in-this-together” mentality, but what about stolen data and online identities?  Ehrensvard suggests that the U.S. government use the FIDO U2F open standard.

“Security is never stronger than its weakest link, and in many IT-systems it is the username/password login,” said Ehrensvard. “To protect Internet users and data, the U.S. government should follow the leading Internet services and thought leaders, and more actively drive implementation of simple and strong two-factor authentication. The FIDO U2F open standard was designed to address this need, and is proven today with global users.”

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Report Reveals Security Training Reduces Global Phishing Click Rates by 86%

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, today launched its “Phishing by Industry Benchmarking Report 2025” which measures an organization’s Phish-prone Percentage (PPP) — the percentage of employees likely to fall for social engineering or phishing attacks, indicating the organization’s overall susceptibility to phishing threats. This year’s report found a global average baseline PPP of 33.1%, meaning a third of employees interact with phishing simulations before taking part in best-practice security awareness training (SAT).COVER 2025-PIB-NA-Report_EN-US Read Now

  • TSA Begins REAL ID Full Enforcement Today

    Today, the Transportation Security Administration (TSA) announced the imminent implementation of its REAL ID enforcement measures at TSA checkpoints nationwide. Read Now

  • Body-Worn Cameras on the Rise

    On the evening of Oct. 29, 2024, the owner of 300 Guard based in Houston, was shot while on duty at a convenience store. He returned fire. He was wearing a plated vest and thankfully recovered in the hospital. Read Now

  • Brazil Port Enhances Surveillance and Supports Wildlife Conservation with Sustainable Technology

    Ferroport, which operates the iron ore terminal at the Port of Açu in São João da Barra, Rio de Janeiro, Brazil, has deployed state-of-the-art video surveillance cameras from Axis Communications to enhance nighttime security and visibility, while decreasing environmental impact and prioritizing sustainability. With cutting-edge technology, the port now has precise surveillance cameras that capture high-quality nighttime images, while reducing the amount of artificial lighting that negatively impacts the surrounding ecosystem. Read Now

  • Fast-Forward from 1,000 B.C.E. to Today

    The lock and key have been around since time immemorial. In fact, the locksmith profession is one of the oldest in the world when you consider the earliest wooden tumbler lock debuted three-plus millennia ago. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.