Category Archives: Internet Security
Cyber crime and hacking law to be formally reviewed, Priti Patel announces – iNews
The law designed to prevent malicious hackers from accessing personal information and other types of cyber crimes will be formally reviewed to ensure it is fit for purpose, Home Secretary Priti Patel has announced.
The Computer Misuse Act was first introduced in 1990 to prohibit unauthorised access to computer material and has been revised several times to account for technological developments, including making the supply or owning of hacking tools illegal and acts that could aid cyber warfare.
Academics, law enforcement agencies and cyber industry experts will be called to provide information to ensure the Act is fit for purpose and up to date, Ms Patel said in a speech made at the annual CyberUK conference.
The freshest exclusives and sharpest analysis, curated for your inbox
It is critical that government has all the right levers available to it to ensure that those who commit criminal acts in the cyberspace are effectively investigated by law enforcement and prosecuted by our criminal justice system, including those perpetrating the most heinous and appalling crimes against children and those committing serious fraud, she said.
As part of ensuring that we have the right tools and mechanisms to detect, disrupt, and deter our adversaries. I believe now is the right time to undertake a formal review of the Computer Misuse Act.
Cyber security experts have long criticised the Act as being out of touch, arguing that it was created when internet use was restricted to less than one per cent of the UK population and before the modern concept of cyber security existed.
CyberUp, a campaign group formed to push for reform of the Act, has called it in its current form hopelessly outdated and legally ambiguous, claiming it prevents security professionals from researching cyber threats for fear of prosecution.
Ollie Whitehouse, chief technical officer of IT security firm NCC Group and spokesperson for the CyberUp Campaign, said the group hoped the review would highlight the Acts current shortcomings and lead to sensible reforms that will keep protecting the UK from an evolving landscape of cyber threats.
This law written in 1990 didnt foresee the birth of the cyber security profession, and therefore leaves ethical cyber security researchers unclear as to whether or not they will be prosecuted simply for doing their jobs. The result is a chilling effect on the cyber security industry, leaving the UK less safe from cyber criminals, he said.
This is a long overdue step for a piece of legislation that simply hasnt kept pace with changes in technology.
The National Cyber Security Centre took down 700,595 malicious online campaignsduring 2020, 15 times more than in 2019 as criminals sought to take advantage of people during the pandemic.
The Centre also observed an increased in hacking and phishing attempts across the world, it announced in its fourth annual report.
View original post here:
Cyber crime and hacking law to be formally reviewed, Priti Patel announces - iNews
How To Choose And Set Up A VPN – Forbes
A VPN, or virtual private network, allows you to safely browse the web by encrypting your data and hiding your IP address, making it seem as though you are browsing from another location entirely.
There are numerous reasons to use a VPN, including data privacy, security when working remotely and the ability to access geographically-restricted content. Dont let their reputation intimidate you. With a little know-how, you can choose and set up a VPN painlessly.
Not all VPNs are created equally. Heres how to pick one thats a good fit for you.
You want a VPN that accommodates the types of devices you want coveredyour phone, laptop and smart tvas well as the amount of devices you want covered.Most premium services offer about five simultaneously connected devices under a single plan. You should attempt to connect all devices within your network to a VPN, in particular those you plan on using on public Wi-Fi networks.
Ideally the VPN you choose will offer fast speeds, multi-level encryption and access to VPN servers in multiple locations. Your VPN provider shouldnt log or collect your data, either. The point of a VPN is privacy.
A full-coverage, pay-as-you-go plan with the features outlined above will cost approximately 5 to 10 a month. If you buy a full year or more in advance, those prices will go down. However, we suggest trying out a VPN before buying a full year plan, checking to make sure that the speeds and features of that particular service work for you.
While you may be tempted to use a free VPN service, you unfortunately get what you pay for. Free VPN services need to recoup their operating costs and often do so by selling user data, thereby removing privacy benefits. There are a few legitimate free services but most are trial versions of paid VPNs with less features or time-limited service. If you want to get serious about your internet security, a paid model is best.
While you may know your feature and pricing needs, you can still get lost in the numerous VPN offerings online. To figure out what each VPN offers and which services are recommended by security experts, lean on trusted advice. We offer a guide, The Best VPNs in 2021, that breaks down costs and features of different VPN apps and the pros and cons of each service. You can use guides like these to do the tough brand research for you, so you can start browsing securely quicker.
Weve compiled a list of what we think are the best VPNs for 2021
If youre setting up a VPN to browse the internet while at homea good step for protecting your data from your internet service provideryou can set-up through your Wi-Fi router and protect all devices that are on your home network at once. However, if youre hoping to get a VPN to protect your data during public browsing and on-the-go usage of your laptop or smartphone, youll need VPN software.
The simplest way to set up a VPN is to download an app of your choice via your internet browser or smart devices app store, then let it set up itself. Most VPN apps will automatically configure on your devices after downloading, making setup quick and easy for anyone.
However, weve also outlined the steps for manual setup for your MacOS, Windows, Android and iOS devices below.
Once youve chosen and installed your VPN, you may wonder when to use it. Ideally, you should try and connect to your VPN whenever possible.
On home networks, a VPN will protect your IP address and internet browsing activity by hiding your identity from your ISP; from the apps and sites you visit; and from the companies that your ISP is selling your data to. Your online activity wont be fully obscured but your identity (via your IP address) will be. A VPN at home isnt a full-proof measure for full anonymity, but it will provide a base level of data security.
On external Wi-Fi networks, a VPN will protect you from internet strangers, encrypting your data and your identity. Whether connecting to Wi-Fi at Starbucks or your airport, a VPN can help keep your data safe. This VPN usage is more critical than at home, as public Wi-Fi is less secure and can easily enable data theft and criminal activity.
That said, sometimes slow operating speeds and app connectivity issues make browsing on your VPN difficult. In cases such as these, its OK to continue browsing. However, you should recognize that your data and activities are less protected than they would be under a VPN.
In public, this means it would be best not to do any particularly sensitive online activities such as banking or dealing with confidential documents. At home, this means recognizing that your ISP can connect your online activity with your real IP address.
Weve compiled a list of what we think are the best VPNs for 2021
VPNs provide data security, obscuring your data and identity from ISPs, internet snoops, companies and government agencies alike. In a world where many activities are done online such as shopping or banking, a VPN provides peace of mind.
While you may be tempted to use a free service, few offer the full data-privacy and malware-protection of paid services. Many free services sell their user data thereby diminishing the greatest value of VPNs: security.
Not always. Most VPN apps offer easy installation processes that automatically add themselves to your phone or computer. Manual installation is easy, but automatic installation is even easier.
Yes, like any software, VPNs are susceptible to hacking. They arent foolproof security measures. VPN companies themselves have been the target of massive hacks. The more information the VPN company stores on you, the more susceptible you are to data breaches.
Read more:
How To Choose And Set Up A VPN - Forbes
Zenlayer Raises $50MM in Series C Financing to Boost Its Lead in Edge Cloud Services – Business Wire
LOS ANGELES--(BUSINESS WIRE)--Zenlayer, a leading global edge cloud service provider, announced the closing of its $50 million Series C financing today. The round was led by a group including Anatole Investment and Prospect Avenue Capital, and included existing investor Volcanics Venture. These investors join F&G Venture, NSFOCUS, and Forebright Capital to bring Zenlayers total financing to $90 million since inception.
Zenlayer will allocate the new financing toward enhancing its edge cloud technology and expanding global network coverage.
I am excited to announce that we have successfully raised $50 million in Series C, said Joe Zhu, Zenlayers Founder & CEO. We'll accelerate the development and adoption of our PaaS solutions, and continue to focus on emerging markets, helping our customers to capture the explosive growth of regions like Southeast Asia and South America. This capital will bring us one step closer to realizing our mission of improving digital experiences for every organization and person, anywhere in the world.
With its unique edge cloud offerings, Zenlayer enables organizations to instantly deploy compute closer to end users and accelerate their networks to deliver the best digital experience possible. Today, Zenlayer can help organizations reach over 85% of the worlds internet population in just 25 milliseconds or less. By using Zenlayer's PaaS solutions, organizations can achieve this without deploying any infrastructure.
Zenlayer Highlights include:
George Yang, Chief Investment Officer, Anatole Investment: Zenlayer is an edge cloud technologies leader uniquely positioned to accelerate digital transformation across the world. IT Infrastructure is a critical need for digital enterprises and Zenlayer has demonstrated the immense value companies gain by improving their users digital experience. Were excited to help Zenlayer accelerate their rapid growth and expansion, and continue to innovate edge cloud computing to new heights.
Ming Liao, Founding Partner, Prospect Avenue Capital: Zenlayer has a remarkable competitive edge. Its exponential growth has made Zenlayer an ideal investment target for Prospect Avenue Capital. Zenlayer is positioned to meet the demands of emerging markets in Southeast Asia, South America, and Northern Africa with its global coverage, low latency edge cloud solutions, and strong infrastructure.
Suyang Zhang, Managing Partner, Volcanics Venture: We began our relationship with Zenlayer in 2019 and have observed the strength and contributions of their team and growth potential first-hand. We are excited to participate in this latest round of financing to continue Zenlayers mission of improving digital experiences for everyone in the world through edge cloud services, instantly.
For more information about Zenlayer, please visit http://www.zenlayer.com.
About Zenlayer
Zenlayer (www.zenlayer.com) offers on-demand edge cloud services in over 180 PoPs around the world, with expertise in fast-growing emerging markets like Southeast Asia, India, China, and South America. Businesses utilize Zenlayers global edge cloud platform to instantly improve digital experiences for their users with ultra-low latency and worldwide connectivity on demand.
About Anatole Investment
Anatole Investment Management Limited is an international investment management firm that manages long-term capital for highly sophisticated professional investors and clients globally.
About Prospect Avenue Capital
Prospect Avenue Capital is a growth equity firm with a focus on IT, financial services, technology, and AI-related sectors.
About Volcanics Venture
Volcanics Venture (www.volcanics.com) is committed to identifying, investing in, and serving the most promising companies and outstanding entrepreneurs in internet innovation, intelligent technology, and healthcare industries. Volcanics Venture brings a powerful combination of global perspective and local experience to investment management, striving to provide sustainable value-added services to portfolio companies.
About F&G Venture
F&G Venture (www.fgventure.com/en/index.jsp) is a venture capital fund focused on companies with exponential growth in IT industries, such as IT infrastructure, cloud computing, IoT, SaaS, big data, etc. It also targets high-end manufacturing businesses, including intelligence devices, robots, and drones.
About Forebright Capital
Forebright Capital (www.forebrightcapital.com) is a differentiated institutional-quality multi-stage growth equity fund manager investing in selected sectors including advanced manufacturing, healthcare, and business services. It is committed to partnering with visionary business leaders, providing value added services, and contributing to the long-term growth of outstanding enterprises.
About NSFOCUS
NSFOCUS (www.nsfocus.com) is a network and cyber security provider for telecom carriers, BFSI, enterprises, healthcare, retail, as well as government agencies. It has a proven track record of protecting over 20% of the Fortune 500 companies, including four of the five largest banks, and six of the worlds top ten telecommunications companies.
View post:
Zenlayer Raises $50MM in Series C Financing to Boost Its Lead in Edge Cloud Services - Business Wire
AV-Comparatives Announces Internet Security Comparison Test for Real-World and Malware Protection for Q1 2021 – PRNewswire
The Real-World Protection Test results released by AV-Comparatives are based on 354 live test cases including working exploits and URLs pointing directly to malware. The test-cases used cover a wide range of current malicious sites, highlighting the quality of protection offered by various products. This AV-test by AV-Comparatives provides detailed insights into the actual capabilities of as many as 17 popular anti-virus products. The results of the false-positives test are also available in the factsheet. The full results, covering four months of on-going testing, will be published in June.
As per the test results published by AV-Comparatives, the tested products were Avast Free Antivirus, AVG Free Antivirus, Avira Antivirus Pro, Bitdefender Internet Security, ESET Internet Security, G Data Total Security, K7 Total Security, Kaspersky Internet Security, Malwarebytes Premium, McAfee Total Protection, Microsoft Defender Antivirus, NortonLifeLock Norton 360, Panda Free Antivirus, Total AV Total Security, Total Defense Essential Antivirus, Trend Micro Internet Security and VIPRE Advanced Security.
"Our Real-World Protection Test is currently one of the most comprehensive and complex tests available, using a relatively large number of test cases. Currently, we are running this test under updated Microsoft Windows 10 Pro 64 Bit with up-to-date third-party software," said Peter Stelzhammer, co-founder of AV-Comparatives. "Every few months, we update the charts on our website showing the protection rates of the various tested products over the past months. The interactive charts for February and March 2021 are now available on our website."
AV-Comparatives has also released the results of its Malware Protection Test for consumer security solutions. 17 popular anti-malware apps were evaluated to assess their ability to protect a system against infection by malicious files before, during or after execution. In addition to detection rates, the test also examines a product's ability to prevent a malicious program from making any changes to the system. The test set used for this test consisted of 10,013 malware. To ensure that the tested programs do not protect the system at the expense of high false-alarm rates, a false-positives test is also run.
To access the just published test results from AV-Comparatives, please visithttps://www.av-comparatives.org.
Real-World Protection Tests:https://www.av-comparatives.org/consumer/testmethod/real-world-protection-tests/Malware Protection Tests:https://www.av-comparatives.org/consumer/testmethod/malware-protection-tests/
About AV-Comparatives: AV-Comparatives is an independent organisation offering systematic testing to examine the efficacy of security software products and mobile security solutions. Using one of the largest sample collection systems worldwide, it has created a real-world environment for truly accurate testing. AV-Comparatives offers freely accessible results to individuals, news organisations and scientific institutions. Certification by AV-Comparatives provides a globally recognised official seal of approval for software performance.
Photo - https://mma.prnewswire.com/media/1499115/AV_Comparatives_1.jpgPhoto - https://mma.prnewswire.com/media/1499116/AV_Comparatives_2.jpgLogo - https://mma.prnewswire.com/media/1341278/AV_Comparatives_Logo.jpg
Contact: Peter Stelzhammer[emailprotected]+43 720115542
SOURCE AV-Comparatives
Continued here:
AV-Comparatives Announces Internet Security Comparison Test for Real-World and Malware Protection for Q1 2021 - PRNewswire
Cyber Security Begins Abroad – War on the Rocks
The Russian Foreign Intelligence Services compromise of U.S. company SolarWinds and a variety of other information technology infrastructures has been described as the greatest cyber intrusion, perhaps, in the history of the world. According to the Biden administration, the hack gave the Russians the ability to compromise or disrupt potentially 16,000 computer systems worldwide, enabling collection of vast amounts of information from federal departments and agencies, private companies, and other victims.
On April 15, the Biden administration outlined its response. The White House formally attributed the campaign to the Russian Foreign Intelligence Service, expelled Russian diplomats from the United States, imposed sanctions on six Russian technology companies that support the intelligence services cyber operations, and issued a new directive imposing sovereign debt sanctions on Russia. The administrations actions were impressive in terms of their scope, drawing on many U.S. response options simultaneously.
While the most newsworthy aspects of Washingtons response to Russia was featured in the first two-thirds of the April 15 statement, the last section outlined important steps that will guide Americas international cyber policy for years to come. The Biden administration explained that it would be supporting a global cybersecurity approach through international capacity-building projects focused on enhancing understanding of the policy and technical aspects of publicly attributing cyber incidents and the provision of training to foreign partners on the applicability of international law in cyberspace. This effort highlights an often overlooked element of U.S. national security and cyberspace policy: Improved cyber security around the world and improved capacity to identify and hold accountable malign actors in cyberspace make the Internet safe for American users and everyone else. When the United States helps its international partners improve their own cyber security, the benefits reverberate across cyberspace.
For the United States, working with foreign governments to make the internet a more secure place is not just a diplomatic opportunity. It should be a key national security priority. International capacity building is particularly critical in cyberspace because threats from hackers, cyber criminals, and hostile intelligence services originate from all over the world. In addition, ensuring the resiliency of cyberspace on a global scale is imperative in countering Chinas growing digital footprint and influence.
As staff of the Cyberspace Solarium Commission, we were tasked with examining all tools of statecraft that contribute to defending the United States from cyber attacks. Not only is it often (unwisely) passed over as a security priority, but current capacity-building infrastructure is inadequate, largely due to outdated legal authorities and processes that insufficiently meet the demands of modern diplomacy and security issues. International cyber security capacity building has a clear and direct benefit for U.S. national security. Congress is currently poised to make major changes to cyberspace policy at the State Department. As it does so, legislators would be wise to ensure that the department has sufficient funding, flexibility, and agility to build global cyber capacity around the globe by creating a fund specifically for cyber capacity building and corresponding authorities to provide emergency assistance.
Capacity Building as a National Security Priority
Capacity-building programs are vehicles for investing strategically in the international community. With respect to cyber security, such programs generally focus on improving national capacity to effectively deliver cyber security (referred to as cyber maturity) and equipping foreign governments with the resources and expertise essential to prevent, detect, withstand, and recover from cyber attacks. In particular, capacity building can help countries build national strategies for enhanced cyber security, collaborate and share information with the private sector on cyber risk management, revise criminal laws and procedures to mitigate cyber crime, bolster incident response and recovery capabilities, advance national cyber security awareness, and grow national cyber security workforces.
Multilateral efforts in the capacity-building arena are well established and supported by U.N. groups and other organizations alike. In particular, the Global Forum on Cyber Expertise has emerged as a leader via its role as a resource clearinghouse. Apart from these multilateral efforts, several states have pursued bilateral or regional cyber capacity-building initiatives. For example, the Australian government has specifically focused on the Indo-Pacific region in its efforts and works with partners across sectors to strengthen cyber security among its neighbors.
Cyber security capacity building serves U.S. national security interests in three ways. First, enabling foreign governments to undertake actions like responding rapidly and effectively to cyber security incidents or tamping down cyber crime makes all of cyberspace a safer place. The United States is not unique in recognizing this. For example, the Canadian government has clearly articulated the linkages between national security and international capacity: The security of Canada is linked to that of other states. When foreign states lack these resources, it can put the security of Canadians and Canadian interests at risk, both at home and abroad. In this sense, cyber security capacity building is a straightforward example of a rising tide lifting all boats.
Second, stronger partners make better partners in countering malign behavior in cyberspace. For example, the United States and Ukraine have worked together for years on cyber security issues, including promoting legal and regulatory reform, cyber workforce development, and private sector engagement. Given the countries longstanding tradition of partnership on law enforcement investigations, not to mention Ukraines unique local cyber security environment, the United States directly strengthens its own security by ensuring that Ukraine is a highly capable cyber security partner. Equipping partner and allied nations with resources for cyber capacity building ensures that beneficiaries are protected from the coercive influence of cyber attacks and enabled to respond effectively. The strength of U.S. partners also helps expand the capacity for enforcing rules of responsible state behavior in cyberspace, promoting collaboration among states that share the U.S. vision for an open, interoperable, reliable, and secure internet. For example, foreign governments must have the independent capability to identify and analyze a cyber attack rapidly in order to engage in the growing trend of issuing a joint attribution and response. This joint enforcement minimizes the burdens any single state faces in holding accountable those who violate rules of responsible state behavior and encourages stability in cyberspace by reinforcing cyber security norms. Projects focused on enhancing joint enforcement and reinforcing cyber norms were precisely those that the Biden administration pledged to support in response to Russian malicious cyber activity, which focused on expanding attribution capacity and providing training regarding the applicability of international law in cyberspace.
Efforts to bolster foreign cyber capacity are distinct from military support for foreign partners in furtherance of hunt forward operations. In hunt forward operations, the U.S. military deploys to other countries to counter threats on foreign networks in partnership with those countries militaries. Capacity-building efforts that strengthen the overall cyber maturity of partner nations can pick up where these efforts leave off, promoting resilience and civilian cyber security without direct engagement of U.S. military personnel. Moreover, these military programs are distinct from incident response teams, whose primary role is to assist victims in the immediate aftermath of a cyber attack. The United States needs different tools for different problems. Capacity-building programs are broader in scope and go even further than existing military programs in strengthening the ability of partners to prevent, withstand, and respond to cyber attacks.
Finally, the national security value of capacity building also implicates efforts to counter Chinas growing investment and influence in the digital infrastructure of countries in the Global South. As countries scramble to keep pace with the digital age, some governments may not have the economic resources to be picky about a source of technical assistance, and the cheapest technology is not always the best suited for promoting open societies. A report from the German Marshall Fund cites as an example, After installing Huawei 4G equipment, video surveillance software, and facial recognition technology, Kenya, Tanzania, Vietnam, and Zimbabwe have to varying degrees seen the adoption of draconian cybercrime laws restricting Internet freedom and clamping down on speech against the government.
Through projects like the Belt and Road Initiative and the Digital Silk Road, leaders in Beijing have found opportunities to both tap into a global customer base for their goods and spur the uptake of technology that aligns with state policy objectives. To give a sense of scale, in 2018, for the second year in a row, investment in African information and communications technology development projects from China alone eclipsed funding from the Infrastructure Consortium for Africa, the organization that combines the efforts of G8 countries and other governments with multilateral efforts like those of the World Bank and the African Development Bank.
U.S. capacity building and cyber diplomacy generally can and should counter growing influence from the Chinese government in the countries that have been dubbed the digital deciders (e.g., Brazil, India, Mexico, and Indonesia). The choices of these actors will have a critical impact on global technology governance and the balance of states that favor an open, global digital infrastructure that protects rights like privacy versus those that favor a closed, sovereign version that enables human rights abuses. U.S. national security reaps very tangible benefits from ensuring that the United States, alongside its partners and allies, is the first and trusted source for cybersecurity expertise, particularly as authoritarian adversaries like the Chinese government compete to influence the future of the internet. Bolstering cyber security capacity enables the United States to advance a free, open, and interoperable Internet and insulates beneficiary nations from Beijings efforts to project power abroad through infrastructure projects.
What Congress Can Do
Congress should create a new capacity-building fund dedicated to cyber security with the authority to provide assistance to countries of all income levels, in all parts of the world, especially during times of crisis. Despite the importance of capacity building as a national security priority, the legal authorities that enable U.S. cyber capacity building are inflexible and slow, often cobbled together from programs that were designed for Cold War-era diplomacy. These tools are insufficient to enable the United States led by the State Department to support foreign partners working to mature their cyber security systems, much less to meet the needs of partner and allied nations during times of crisis. Without specifically dedicated funds, cyber security is forced to compete with a variety of other foreign assistance priorities.
Existing frameworks for distributing aid make it difficult for the United States to support the cyber priorities of certain countries. These difficulties relate to the way foreign governments structure oversight of their cyber security policy and strategy, and to foreign assistance eligibility criteria that are tied to country income level or geographic location.
In the first case, the difficulty stems from otherwise practical limitations like those in the legislation authorizing the Economic Support Fund one of the primary vehicles through which the State Department can fund foreign assistance projects. The law stipulates that the Economic Support Fund may not be used for military or paramilitary purposes. While this is important for ensuring the United States does not fund the development of offensive cyber operations programs in foreign countries, it hamstrings Americas ability to help countries bolster their civilian cyber security when such programs are overseen by military organizations. Colombia, for example, runs its national computer emergency response team through its Ministry of Defense, as does Latvia, and in Spain, the function sits under the national intelligence agency.
In the second case, the difficulty stems from the eligibility requirements associated with the use of certain foreign assistance funds. Congress should consider expanding criteria for cyber security capacity-building programs to allow for the provision of aid to middle-income countries, irrespective of geography. Some funds, like those earmarked for the Assistance to Europe, Eurasia, and Central Asia Fund, are limited to a particular geographic region. Other funds are generally aimed at providing assistance to low- and lower middle-income countries, which is an important means of ensuring that foreign aid is channeled to those countries in greatest need of support. When it comes to cyber security, however, some strategically important countries do not meet these criteria. Singapore, Taiwan, Indonesia, and Thailand, for example, are all considered upper-middle-income economies or high-income economies by the World Bank, but both private companies and government entities have been the target of economically and geopolitically motivated attacks, some of which have been attributed to Chinese groups. As currently structured, existing authorities can make it slow and bureaucratic to get funding to countries such as these, but given the regions strategic importance, there are occasions when doing so may be both critical and time-sensitive.
A specific account dedicated to cyber security could allow Congress to ensure that all foreign assistance priorities including cyber security receive sufficient funding and resources. The March 2020 report of the U.S. Cyberspace Solarium Commission, a congressionally mandated body examining cyberspace policy, specifically recommended legislative action to untangle this issue. Both of the problems highlighted above speak to the short-term priority for strengthening U.S. abilities to build cyber security capacity: building flexible, consolidated funds for cyber security to overcome competing priorities for foreign assistance. Though funds can be cobbled together from the alphabet soup of foreign assistance funds, the absence of a designated fund means that cyber security competes with priorities like bolstering democracy and the rule of law, encouraging the development of free markets, or building peace in conflict-ridden regions. Additionally, a distinct fund would allow for the development of flexible eligibility criteria that are specifically tailored to strategic cyber-related objectives.
Anticipating Challenges
Existing U.S. capacity-building programs also face challenges related to agility and are inadequately positioned within broader efforts to counter Beijings growing influence abroad. Foreign assistance moves slowly. Capacity-building programs are aimed at boosting the cyber maturity of partner and allied nations, a process that can take years, if not decades. And even countries with the most mature cyber capabilities are not immune to crisis. When such crises arrive, it may be critical for the United States to move money immediately to aid with incident response and remediation. Congress should ask the State Department to review in consultation with other federal departments and agencies the process of delivering foreign aid in times of crisis and how the process for cyber security capacity building can be streamlined or expedited during exigent circumstances so that the State Department can support foreign partners when they need it most. Such assistance would be similar to the rapid humanitarian and disaster relief aid that the State Department and USAID distribute during times of crisis.
Additionally, departments and agencies with responsibility for allocating foreign assistance and implementing capacity-building projects should think about how these projects and programs fit into broader U.S. efforts to counter Beijings influence and investment in the Global South. In the face of such a concerted effort, the United States needs a careful, thoughtful strategy, connecting capacity-building efforts with diplomacy, law enforcement, private sector engagement, and more. The Cyber Diplomacy Acts proposed Bureau of International Cyberspace Policy would be an ideal place for some of this coordination to take place.
Beyond the geopolitical issue of China, the Bureau of International Cyberspace Policy is an important place to align capacity-building efforts with broader cyber diplomacy goals addressing competing models of internet governance. Similarly, improved coordination at the White House level via the new office of the national cyber director can help align international capacity-building efforts across U.S. government agencies. In addition to the State Departments work, the Department of Homeland Security is planning an international cyber security capacity-building sprint. Meanwhile, the Cybersecurity and Infrastructure Security Agency launched an international strategy, CISA Global, which aims also to support the State Departments work with international partners on capacity building.
When it comes to international capability in cyberspace, U.S. civilian agencies should take the lead. While the Defense Department has a huge role to play in keeping the country safe in cyberspace, U.S. diplomats are better positioned to advance U.S. cyber security interests in foreign capitals. Ensuring that all tools of international engagement including military, diplomatic, and foreign assistance are aligned is imperative to strengthening the credibility of Americas actions in cyberspace, and the Bureau of International Cyberspace Policy is a good focal point for that coordination within the State Department.
Looking Ahead
The Biden administrations emphasis on capacity building in response to Russian malicious cyber activity is an important reminder that, in cyberspace, Americas safety is wound up with that of the rest of the world. As Congress works to improve the governments structure for engaging internationally on cyber security, it should ensure that the State Department has the authority to provide aid in a timely and concerted fashion. By doing its part to help partners and allies, the United States can take a crucial step in building a resilient cyberspace and protecting vital U.S. interests.
Natalie Thompson is a research analyst with the U.S. Cyberspace Solarium Commission. Previously, she was a research assistant and James C. Gaither Junior Fellow at the Carnegie Endowment for International Peace, working with the Technology and International Affairs Program on projects related to disinformation and cybersecurity. She tweets at @natalierthom.
Zoe Peach-Riley is a research intern with the U.S. Cyberspace Solarium Commission. She is a current student at the University of Southern California, where she is pursuing a major in intelligence & cyber-operations.
Laura Bate is a senior director with the U.S. Cyberspace Solarium Commission and a 2021 Next Generation National Security Fellow with the Center for a New American Security. Previously, she was a policy analyst with New Americas Cybersecurity Initiative and remains an International Security Program Fellow. She tweets at @Laura_K_Bate.
Image: State Department
The Security Issues Holding Back the Rollout of the Industrial Internet of Things – CMSWire
Many of the discussions about the Internet of Things, or IoT, focus on the positives of having a connected home or a connected workplace. But there's also been a focus on the weaknesses and flaws in the IoT. High on that list is security and concerns about the safety and integrity of all those devices that we're connecting together.
If security problems can cause serious problems for consumers, compromised security for the Industrial IoT (IIoT) can be devastating for organizations involved and result in a significant reputational hit when devices are hacked, and even a shutdown if the attack is serious enough. As the world has become more connected over the past year, that has pushedIIoT security to the top of security professionals' agenda.
The bad news is that many of those responding to a recent survey say they are not prepared to protect their organizations infrastructure. In March 2021, Tripwire, a Portland, Ore.-based provider of security and compliance solutions for enterprises, surveyed 312 security professionals whomanage IoT and IIoT devices across their organization.
According to the survey, 99% of security professionals report challenges with the security of their IoT and IIoT devices, and 95% are concerned about risks associated with these connected devices. More than three quarters of those surveyed said that connected devices do not easily fit into their existing security approach, and 88% required (or still require) additional resources to meet their IoT and IIoT security needs.
This is of particular concern for those in the industrial space, as more than half (53%) said they are unable to fully monitor connected systems entering their controlled environment, and 61% have limited visibility into changes in security vendors within their supply chain.
Related Article: The Future of IoT and the Digital Workplace
One of the most significant technologies of the 21st century, IoT has the power to revolutionize our daily functions and how we interact with our homes and each other. The mass usage of IIoT is a massive opportunity but it comes with many problems that manufacturers have yet to answer, said Ondrej Krehel, CEO ofLIFARS, a New York City-based cybersecurity firm. The biggest potential downside is that they are not safe from cybercriminals.
In 2021, there is no device in the world that is 100% safe from all outside threats," he said. "Any Internet-connected device anywhere is vulnerable to some type of attack. However, considering the interconnectivity of IoT devices, a simple breach could be catastrophic and expose problems to an entire network of devices [across the enterprise], instead of just one. Those threats include:
Related Article: How the Internet of Things Enables Remote Workers
The security of IIoT devices is easily its biggest problem. Manufacturers and service providers should prioritize the security and privacy of their products and should also provide encryption and authorization by default to protect users as much as possible.
Tom Winter, HR tech recruitment advisor and co-founder of New York City-based DevSkiller, pointed out that while IoT has been a great factor in the proliferation of smart homes, smart offices have yet to take flight in the same way. The fact that companies and organizations have significant security issues is one of the reasons why industrial IoT implementation has not caught on in the workplace.
There is a clear disconnect between organizational IoT systems and their users. Yet, the importance of these systems is inevitable and organizations must educate their users to build knowledge and awareness. There is one more factor: the maturity of the commercial products in the market today.
Perhaps they are not yet ready for all types of offices just yet," Winter said. "There may need to be some time for the market to adjust to the needs of various organizations."
The proliferation of 5G networks will vastly improve both the security and performance of these IoT systems. Because not all regions globally have access to this technology yet, there needs to be patience on the part of companies before IoT workspaces become a full-fledged phenomenon.
Organizations and chief information security officers are right to be concerned by IIoT security, but the benefits and market potential are such that companies cannot sit idly by either, said Hatem Oueslati, co-founder and CEO of France-based IoTerop. One positive is that Europe, the UK, and the US all recently introduced cybersecurity regulations highlighting the importance of security, but even these suggestions can be problematic. Take firmware updates, for example. Poorly implemented FOTA mechanisms can create vulnerabilities.
Security should be an integral pillar of product strategy. No one buys thousands of smart meters without looking closely at security. Security is one reason original equipment manufacturers are attracted to the lightweight M2M standard (LwM2M). Initially, they want to reduce time to market and improve solution quality. However, standardized device management services like zero-touch device commissioning and PKI provisioning, monitoring, authentication and encryption are crucial to operating secure, cost-effective IoT solutions.
Soon, billions of devices will deliver the goods and services we need to live, like healthcare, electricity and more," Oueslati said. "From the device to the cloud, everything must be secure and standardized so the risks are not hidden.
There are other issues, too. The hype around IoT years ago was off the charts, said Ron Exler, director and principal analyst at the Stamford, Conn.-basedInformation Services Group. The excessive predictions about its spread explain why there are questions over why it has not spread as fast as might have been expected.
It also explains the lack of scale in enterprise deployments. Many IoT pilots launched amidst the hype but many did not scale because they could not show adequate ROI, and many enterprises are still concerned about security.
The result, Exler said, is that service providers will not do pilots. Instead, they show the ROI for full deployments, get executive buy in and then go. What is left in the enterprises are the closed systems, such as factories. In these environments, even small improvements in productivity are important and can be more easily measured. These environments are also more conducive to 5G deployment.
The lack of standards and interoperability is also a problem for enterprise IoT. Enterprises seek to lower risk and one way to do that is to rely on a multiple vendors. Plus, multi-vendor solutions can be more robust. The IT systems connecting to the operational systems are critical, too. Without adequate standards for data exchange and security, the idea of the IoT will not reach its full potential, Exler said.
Underlying all this is the fact that security is an afterthought. Every device is a potential entry point for hackers yet it is an open secret in the industry that the IoT ecosystem of vendors is more concerned with getting new products to market than securing them. Most consumers do not pay attention but many enterprise buyers do. The security risks simply are not worth it for them, especially when the ROI is unpredictable or fleeting.
Exler argued that while AI can help IoT, especially at the edge to collect and process the right data, it could also help with security. But it is not a panacea. 5G will help for some applications where speed and network latency are critical.
Go here to read the rest:
The Security Issues Holding Back the Rollout of the Industrial Internet of Things - CMSWire
ISC urges updates of DNS servers to wipe out new BIND vulnerabilities – ZDNet
The Internet Systems Consortium (ISC) has released an advisory outlining a trio of vulnerabilities that could impact the safety of DNS systems.
This week, the organization said the vulnerabilities impact ISC Berkeley Internet Name Domain (BIND) 9, widely used as a DNS system and maintained as an open source project.
The first vulnerability is tracked as CVE-2021-25216 and has been issued a CVSS severity score of 8.1 (32-bit) or 7.4 (64-bit). Threat actors can remotely trigger the flaw by performing a buffer overflow attack against BIND's GSSAPI security policy negotiation mechanism for the GSS-TSIG protocol, potentially leading to wider exploits including crashes and remote code execution.
However, under configurations using default BIND settings, vulnerable code paths are not exposed -- unless a server's values (tkey-gssapi-keytab/tkey-gssapi-credential) are set otherwise.
"Although the default configuration is not vulnerable, GSS-TSIG is frequently used in networks where BIND is integrated with Samba, as well as in mixed-server environments that combine BIND servers with Active Directory domain controllers," the advisory reads. "For servers that meet these conditions, the ISC SPNEGO implementation is vulnerable to various attacks, depending on the CPU architecture for which BIND was built."
The second security flaw, CVE-2021-25215, has earned a CVSS score of 7.5. CVE-2021-25215 is a remotely-exploitable flaw found in the way DNAME records are processed and may cause process crashes due to failed assertions.
The least dangerous bug, tracked as CVE-2021-25214, has been issued a CVSS score of 6.5. This issue was found in incremental zone transfers (IXFR) and if a named server receives a malformed IXFR, this causes the named process to crash due to a failed assertion.
The ISC is not aware of any active exploits for any of the bugs.
Vulnerabilities in BIND are treated seriously as it can take just one bug, successfully exploited, to cause widespread disruption to services.
"Most of the vulnerabilities discovered in BIND 9 are ways to trigger INSIST or ASSERT failures, which cause BIND to exit," the ISC says. "When an external user can reliably cause the BIND process to exit, that is a very effective denial of service (DoS) attack. Nanny scripts can restart BIND 9, but in some cases, it may take hours to reload, and the server is vulnerable to being shut down again."
Subscribers are notified of security flaws ahead of public disclosure, and if patches have not been applied for the latest trio of vulnerabilities, fixes should be issued as quickly as possible.
BIND 9.11.31, 9.16.15, and 9.17.12 all contain patches and the appropriate update should be applied.
CISA has also issued an alert on the security issues.
In other security news this week, Microsoft has disclosed bad memory allocation operations in code used in Internet of Things (IoT) and industrial technologies, with a range of vulnerabilities classified under the name "BadAlloc". Microsoft is working with the US Department of Homeland Security (DHS) to alert impacted vendors.
Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0
Follow this link:
ISC urges updates of DNS servers to wipe out new BIND vulnerabilities - ZDNet
Dedicated core network is the cornerstone of secure IoT – Ericsson
A proprietary network created specifically for IoT use can not only facilitate the management of a plethora of connected devices, but also provide a sound basis for protecting traffic.
The number of IoT (Internet of Things) connections will rise to 5.9 billion by 2026, representing a growth of about three and a half times from 1.7 billion counted last year. Protecting this enormous pool of online devices is already extremely important, but as it grows, it will become increasingly critical. With the IoT Accelerator solution, abbreviated as IoTA, Ericsson paves the way for a brisky and safe offer on the IoT landscape. For large enterprise customers and telecommunications companies, the solution offers a dedicated IoT network as a service i.e., as part of the "as-a-service business model which includes a number of additional services and functions that are available on demand, from telematics and subscription management to the management of vehicles with online connectivity.
IoTA also offers extensive eSIM support to manage IoT fleets as flexibly as possible. There are currently a total of about 80 million traditional SIMs and eSIMs connected to the IoTA network worldwide, covering more than seven thousand large enterprise customers and more than 35 telecommunications providers - in more than 100 countries.
The reliability of the protection is already well illustrated by the user base; IoTA also supports public customers, and in their case the platform is considered a Critical National Infrastructure (CNI), so it is subject to extremely strict regulations. In addition to GDPR compliance that is a fundamental requirement in the EU, such regulations include, for example, the NCSC (National Cyber Security Center) guidelines in the UK and a series of country-specific, detailed specifications that are regularly checked by customers through random audits.
This is understandable, as there are many IoT projects that handle extremely sensitive data it is enough to think about the fleet management of vehicles with online connectivity or even information from health sensors. In developing and operating IoTA, Ericsson therefore pays special attention to security - the system eliminates, among other things, the top ten security risks identified by the global Open Web Application Security Project (OWASP) which specializes in software security.
Ericsson's customers who actively use IoTA include Sony, specifically its Soy Network Communications Europe division, which uses it to lay the foundations for various mobile IoT platforms such as Visilion or mSafety. Visilion is an advanced tracking solution used in the logistics and healthcare segments that provides real-time location data based on a variety of sensors in applications covering shipped goods, various values, or even people. mSafety is an eSIM-enabled, wearable device-based platform with a cloud-based backend. The latter can be connected to devices either on an LTE or on an NB-IoT network to transmit various measured health data. The two systems can used to implement services such as SafeTrx, which monitors the location of people doing sports in the open, such as surfers, and notifies the appropriate authorities in an emergency.
For similar applications, both adequate network protection and reliable, stable operation are essential, which Ericsson is willing to provide to its partners who can connect to the company's core network and use all the modular services available on it. These include subscription management or user administration, but they can also take advantage of APIs provided through Ericssons developer portal to develop applications for the platform themselves, which is also protected by a multi-layered authentication solution with role-based access control.
In addition, the integration of Ericsson Security Manager is already in progress on the IoTA platform the company's well-proven bastion will also offer extensive security features, with real-time, automated network protection supported by risk-based security policies and artificial intelligence.
The artificial intelligence-based protection builds on behavioral analytics it monitors homogeneous groups of devices, learns the usual characteristics of the group, and alerts you when a device exhibits behavior that is significantly different from its group. For example, if the system detects more unidirectional traffic than is usual in your environment, it can alert operators to a potential DoS attack. The development of such and similar services is now possible in Hungary as well, as Ericsson's Budapest team has also been participating in the international cooperation since the end of last year. The local team is constantly expanding, and is set to play an increasingly strategic role in the IoTA organization in the coming years.
Check out our open positions: ericsson.hu/jobs
Go here to see the original:
Dedicated core network is the cornerstone of secure IoT - Ericsson
The U.S. Should Make Leverage the Foundation of Its Cyber Strategy – Council on Foreign Relations
Justin Sherman (@jshermcyber) is a fellow at the Atlantic Councils Cyber Statecraft Initiative. Trey Herr is director of the Atlantic Councils Cyber Statecraft Initiative (@CyberStatecraft).
The SolarWinds incident spurred a flurry of debates about whether the U.S. Department of Defenses 2018 defend forward strategy should, or could, have prevented the calamity. Putting aside that the Russian operation was cyber espionagestealing data rather than denying, disrupting, degrading, or destroying systemssome of these arguments reflected an idea that the United States should defend forward or persistently engage everywhere, all the time.
More on:
Cybersecurity
Digital Policy
However, this idea is not only unrealistic, with resource constraints (in personnel, target information, access to adversary networks, organizational capacity, etc.) limiting the collective reach of U.S. cyber operations at any given time; it also ignores the concept of points of leverage in the broader internet ecosystem.
Net Politics
CFR experts investigate the impact of information and communication technologies on security, privacy, and international affairs.2-4 times weekly.
Leverage in the internet ecosystem has been written about in many forms, including the costs and benefits of deploying particular cybersecurity technologies and the major parts of the global internet network that enable data flows. Yet discourse on persistent engagement that seems to suggest a constant engagement on all parts of the network ignores the very idea of leverage that should be the foundation for the conversation itselfunderstanding how defensive and offensive actions can shift points of leverage on the internet.
The New York Cyber Task Forces 2017 report discusses the idea of leverage, for instance, in a somewhat productized sense vis--vis software and internet security. Cybersecuritys most successful innovations, they wrote, have provided leverage in that they operate on an internet-wide scale and impose the highest costs (roughly measured in both dollars and effort) on attackers with the least cost to defenders. Encryption, automatic software updates, and secure-by-design software were just three examples provided by the task force. The cost-benefit of their deployment favors the defender.
A new report from the Atlantic Council on lessons from the Sunburst campaign likewise argues that government and industry should embrace an idea of persistent flow in cybersecurity, emphasizing that effective cybersecurity is more about speed, agility, and concentrated action than trying to do everything, everywhere, all at once. This concentration is necessary because just as there are cybersecurity technologies that give leverage to a defender, some vectors of compromise give disproportionate leverage to attackers.
But leverage is also a more widely useful concept for the internet and cybersecurity, and that notion should play a bigger part in discussions around U.S. cyber strategy. Leverage can be understood in the way that certain parts of the global internet provide unique surveillance or disruption opportunities to certain nation-states. Henry Farrell and Abraham Newman write in their 2019 article Weaponized Interdependence [PDF] about panopticons in networks, which states can use to gather strategically valuable information, and chokepoints in networks, which provide opportunities to deny network access to adversaries. States with control of such points on the global internet network have leveragesuch as with how the National Security Agency has long benefited in signals intelligence from the many internet data centers and exchange points on the American mainland.
More on:
Cybersecurity
Digital Policy
Similarly, points in the global internet architecture can serve as places of leverage for nation-states looking to secure them or exploit their vulnerabilities. Data routing security is one such example. The Domain Name System, the internets phone book for addressing traffic, and the Border Gateway Protocol, the internets GPS for routing traffic, were both designed with a preference for speed and reliability over security. Both systems are crucial to the global internets very function and yet remain fundamentally insecurevulnerable to outright manipulation. They are also both areas where small changes would yield massive gains in cybersecurity, underscoring that, as we previously argued, one of the best ways to approach a U.S. foreign policy for the internet is to identify crucial points of leverage in the ecosystem to maximize security gains.
This raises the distinction between chokepoints and leverage, however, where leverage provides highly scalable effects on cybersecurity (i.e., small inputs yielding outsized change across a system or ecosystem) and imposes significant costs for comparatively small input. Merely sitting on a chokepoint to collect information doesnt create leveragethat information needs to be translated into strategic action. Information sharing about threats, absent a strong model for interagency collaboration and a specific desired end state, is not enough. Points of leverage on the internet can shift at varying speeds, whether from defensive and offensive cyber actions or physical alterations to the internets topology. U.S. cyber strategy should therefore emphasize that steps within the cyber domain to exploit or protect those points of leverage do more than alter the position of each actor involvedthey also alter the cyber environment itself.
Digital and Cyberspace Update
Digital and Cyberspace Policy program updates on cybersecurity, digital trade, internet governance, and online privacy.Bimonthly.
The Sunburst campaign provides myriad reasons for the U.S. government and industry to reassess their policies and practices on the likes of both cloud and supply chain security[PDF]. Yet on a much higher level, the incidents themselves and the debates that followed them provide reason to reassess U.S. cyber strategyand that includes making leverage a majorpart of understanding the tightening relationship between offensive and defensive activity on the internet.
Read the rest here:
The U.S. Should Make Leverage the Foundation of Its Cyber Strategy - Council on Foreign Relations
New Georgia Bills Will Affect Public’s Access to Cybersecurity Details – University of Georgia
Georgia House Bill 156, signed by Gov. Brian Kemp in late March, increases data sharing between different parts of government about data breaches and cyber-attacks, according to Sarah Brewerton-Palmer, chair of the Georgia First Amendment Foundations Legislative Committee.
However, Brewerton-Palmer is concerned the bill could exempt an entire report about cybersecurity breaches from the Open Records Act depending on the interpretation of the law.
Georgia House Bill 156 went into effect March 25. It allows government agencies to conduct proceedings related to cybersecurity to be held in executive session, and provide for certain information, data, and reports related to cybersecurity and cyber attacks to be exempt from public disclosure and inspection, according to the bills summary.
Another bill, House Bill 134, which has passed both chambers in the Georgia General Assembly, says that if youre discussing anything related to cyber attacks or cyber security, that could all be done in executive sessions, according to Brewerton-Palmer. That doesnt include contracts and payment for services; those would still be made public.
Brewerton-Palmer is concerned, though, that these bills will affect the publics access to information regarding cybersecurity.
Theyre sort of a one-two punch, said Brewerton-Palmer. While House Bill 156 is a reporting requirement House Bill 134s main function is to amend the Open Records Act and Open Meetings Act. House Bill 134 would allow government agencies to go into executive sessions, which are portions of open meetings closed to the public.
Georgia House Rep. Todd Jones (R-South Forsyth) is a sponsor for House Bill 134. He said, The open records and open meetings law have measures that exempt certain information that would affect public safety.
Jones said the issue of cyber security warrants the use of executive sessions and the exemption of information regarding cyber security plans from the Open Records and Open Meetings acts in order to ensure the protection of the publics private data.
I think our citizens would say that the security of their personal information is tantamount, said Jones.
However, Brewerton-Palmer said the language of the bill is too broad and could potentially allow government agencies to interpret the law in which any discussion regarding cyber security could be held in executive session.
Information like the existence of a data breach or attack or more generic information like what kind of information was disclosed, that information the public might want to know that would probably not compromise security efforts going forward, said Brewerton-Palmer.
Were not asking for the code to the software to be posted; were not asking for the details for how hackers got into the system to be made public. What should be made public is how much the government is spending on internet security, how much the system has been compromised, said Richard Griffiths, media ethicist and member of the board of directors for the Georgia First Amendment Foundation.
Georgia Sunshine Laws were updated in 2012. They allow the public to more easily use open records and open meetings laws. Georgias open records laws already do have exemptions for information regarding public safety.
While journalists often make use of open records laws, the public is most affected by legislation that limits the publics right to information, according to Griffiths.
If the public doesnt know whats going on in government, they cant hold the people they elect to account for the good decisions and the not-so-good decisions they make, Griffiths said.
According to Jones, if exemptions to the open records and open meeting laws are to take place, the use of executive sessions should be made transparent.
Government and sunshine is one of the key ways that we ensure that the government is working for the people. They should know if were going to give any exceptions to that rule it should be done through statute, and it should be done in the sunshine, said Jones.
Government transparency is good not just for journalists; its good for every person in this country. Government transparency allows the public to keep the government accountable for rational decisions to be made on the best possible information, said Griffiths.
Micheal Prochaska, editor for the Oconee Enterprise, said he believes citizens have a right to know what their government is working on and how they are using taxpayer dollars.
Its important that people know what their taxpayer dollars are going toward. Keep in mind, all these government entities levy taxes on citizens and citizens have a right to know where their tax money is going, said Prochaska.
Information regarding cybersecurity details warrants exemptions from open records and open meetings laws, according to Jones.
The bill was crafted in such a way that the actual detail planning could be done in work session so in that way, it was not public information so potential hackers, potential ransomware perpetrators, they wouldnt have the key to determine how you would break through on any of the cyber security plans, said Jones.
According to Prochaska, local journalism depends on the transparency of government in order to disseminate information to the public.
A lot of what we write about is government meetings, things that we cover are city council meetings for the municipalities in Oconee County, said Prochaska.
According to Pew Research Center, trust in government has been on a decline for several years. Open government allows for greater transparency and gives the public the opportunity to hold government officials accountable, according to Griffiths.
As our society increasingly goes online, the public will need to know how their data is being protected, said Griffiths. Holding government officials accountable is vital to democracy.
As of now, the Georgia House Bill 134 has passed both the Georgia House and Senate. The bill has been sent by the House to be signed by Gov. Kemp. Unless vetoed, the bill will become law.
The Georgia General Assembly legislative session has concluded this spring. Palmer-Brewerton hopes concerns regarding these bills can be addressed during future Georgia legislative sessions.
Fabian Munive is a senior majoring in journalism at the Grady College of Journalism and Mass Communication
More here:
New Georgia Bills Will Affect Public's Access to Cybersecurity Details - University of Georgia