TechWonk Blog Subsection
TechWonk Blog
To learn more about 91pro视频's work and position on Cybersecurity, please visit
-
After several months of patient work, 91pro视频 saw important results in the forward-leaning cybersecurity principles document issued at the G7 Leaders Summit held in Japan last week. The principles document closely follows a more comprehensive statement developed at the G7 ICT ministerial April 29-30 in Takamatsu, which 91pro视频 supported through various discussions, events, and written statements, including [...]
-
Today, House Judiciary Committee lawmakers will get their first opportunity to delve into the complex issues presented by what鈥檚 become known as 鈥渢he Apple case.鈥 As these policymakers examine the implications of encryption technology, we hope they will keep the following five points in mind. First, the women and men who work for U.S. technology companies abhor crime and terrorism. They work each day [...]
-
An unexpected break from the norm happened in Washington last year 鈥 despite all predictions to the contrary, Congress and the President actually got to work and produced several bipartisan wins for the technology sector and our economy in general. We give credit where credit is due, and we applaud Congress and the President for working together to advance these policies in 2015 that affect the growth [...]
-
It is safe to say Internet of Things (IoT) fascination has gripped Washington鈥檚 attention. Over the past year, there have been no fewer than six congressional hearings and the launch of the Congressional Caucus on Internet of Things (IoT). It seems there is a large IoT forum taking place somewhere in the nation鈥檚 capital on an almost weekly basis. We welcome policymakers鈥 interest in IoT, and look [...]
-
As both producers and users of cybersecurity products and services, 91pro视频鈥檚 members are highly motivated to protect user information and are at the forefront of innovation in the security space. At the same time, 91pro视频 has consistently opposed technology-specific mandates鈥攊ncluding, but not limited to, spectrum use flexibility, universal service fund availability, FAA in-flight device regulation, automotive [...]
-
As President Obama prepares to welcome Chinese President Xi to the White House this month, cybersecurity concerns should be a priority topic of discussion. For the benefit of both countries, however, the dialogue should be aimed at reducing, not escalating bilateral cyber tensions. Not only are the U.S. and Chinese economies closely intertwined - as recent market events have proven 鈥 but a closed China [...]
-
This week the House of Representatives will consider two cybersecurity threat information sharing bills on the floor:聽the Protecting Cyber Networks Act (H.R. 1560), and the National Cybersecurity Protection Advancement Act (H.R. 1731).聽 We commend the House for its action in this area, and 91pro视频 will consider scoring votes in support of both bills in our 114th Congressional Voting Guide.聽 As the leading [...]
-
When we surf the Internet, conduct e-commerce, or send emails and texts, we often don鈥檛 think about the tremendous work or resources going on behind the scenes to protect the networks and information we routinely use to connect and accomplish our daily tasks.聽 Those networks are constantly besieged by increasingly sophisticated cyber criminals, and voluntary cybersecurity threat information sharing [...]
-
Tomorrow the White House is hosting a summit at Stanford University on the important topic of cybersecurity.聽 Silicon Valley is a fitting backdrop and there will be high level participation from both CEOs and leaders from many of the companies who have long been leading cybersecurity advancements.聽 We welcome this engagement and hope it will expand the dialogue to reinforce the notion that we all have [...]
-
Halfway into January, 2015 is starting to emerge as a year policymakers will focus more strongly on cybersecurity in the United States. Today President Obama took a significant step in sending a cybersecurity legislative package to Congress. His proposed legislation covers three topics: 1) enabling cybersecurity information sharing, 2) modernizing law enforcement authorities to combat cybercrime, and [...]
- ...