Stefanie Hoffman over at Fortinet took the time to summarize the current cybersecurity bills. This fight is far from over, so you might want to take a look at what's cooking at Capitol Hill.
She started out with: "No doubt, the recent groundswell of legislation around cybercrime and cyber security has served to raise public awareness and could potentially spur security sales as the issue remains on the forefront of political and social debate. But with the barrage of newly introduced cybersecurity legislation, its easy to get lost in the melee of political, technical and legislative jargon, not to mention a sea of vaguely understood acronyms.
Here is a bit of a guide that might make the path through this jungle a tad easier. Cyber Intelligence Sharing and Protection Act (CISPA): Almost certainly the most significant, and controversial, piece of cybersecurity legislation is the recently introduced Cyber Intelligence Sharing and Protection Act, or CISPA, which is currently en route to the Senate after passing by a sizeable majority248 to 168 in the House of Representatives last week." Here is the Fortinet blog post:
She started out with: "No doubt, the recent groundswell of legislation around cybercrime and cyber security has served to raise public awareness and could potentially spur security sales as the issue remains on the forefront of political and social debate. But with the barrage of newly introduced cybersecurity legislation, its easy to get lost in the melee of political, technical and legislative jargon, not to mention a sea of vaguely understood acronyms.
Here is a bit of a guide that might make the path through this jungle a tad easier. Cyber Intelligence Sharing and Protection Act (CISPA): Almost certainly the most significant, and controversial, piece of cybersecurity legislation is the recently introduced Cyber Intelligence Sharing and Protection Act, or CISPA, which is currently en route to the Senate after passing by a sizeable majority248 to 168 in the House of Representatives last week." Here is the Fortinet blog post: