The Cybersecurity Act of 2012 is a joint effort by leaders and senior members of the Senate Committees on Commerce, Homeland Security and Governmental Affairs, and Intelligence to give the federal government and the private sector the tools necessary to protect U.S. most critical infrastructure from growing cyber threats.
The bill is a combination of legislation passed by the Commerce and Homeland Security Committees, and it incorporates extensive input from companies and trade associations representing a large swath of the private sector, including the information technology, financial services, telecommunications, chemical, and energy sectors.
The National Intelligence Director James Clapper said in testimony delivered to the House Intelligence Committee on tuesday that, among state actors, China and Russia are of particular concern. In fact, as indicated in the October 2011 biennial economic espionage report from the National Counterintelligence Executive, entities within these countries are responsible for extensive illicit intrusions into US computer networks and theft of US intellectual property.
This report is made up of a survey of some 250 leading authorities worldwide and of interviews carried out in late 2011 and early 2012 with over 80 cyber security experts in government, companies, international organisations and academia.
It offers a global snapshot of current thinking about the cyber-threat and the measures that should be taken to defend against it, and assesses the way ahead.
Chairman of the Joint Chiefs of Staff - Gen. Martin Dempsey - announced the release of the new American Operational Concept that reinforces the importance of space and cyberspace to military operations.
Cyber Security & Cyber Intelligence. La Sicurezza dei Contingenti Militari contro le nuove minacce
Alcune delle minacce più critiche nei confronti dei Paesi occidentali provengono oggi giorno dal settore dell’informatica. Sullo scacchiere internazionale, infatti, si muovono con sempre più efficacia le organizzazioni criminali, interessate a sottrarre attraverso la rete informazioni personali e denaro, le spie, intenzionate a rubare i segreti e le informazioni classificate delle nazioni, nonché i terroristi, impegnati nella ricerca di nuovi metodi per attentare.