recommended reading

The Internet Is Not Freaking Out About the SOPA Sequel

Protestors wearing Guy Fawks masks hold the logos of the international hacker group Anonymous during a demonstration against online censorship laws.

Protestors wearing Guy Fawks masks hold the logos of the international hacker group Anonymous during a demonstration against online censorship laws. // Janos Marjai/AP

Over 200 sites are participating in today's Internet shutdown to protest the cyber-security bill Cyber Intelligence Sharing and Protection Act (CISPA), which the House of Representatives passed last week. But, the big names that showed up to last year's nearly Internet-wide protest of SOPA—like Wikipedia and Wired—haven't shut down their sites this time, even though opponents argue this bill is worse than any previously proposed Internet regulation. "#CISPA is the ugly fusion of SOPA and PIPA into a super zombie bill determined to kill your online privacy," tweeted out YourAnonNews today, to underscore that very point. The voices speaking out today are very loud, but they don't have the ubiquity or scale of that last round of online protests.

Unlike SOPA which was widely condemned in the tech community,  CISPA has the support of some major tech companies for the bill's measures meant to help them fight hackers. Last year Facebook came out in support of the legislation. And though it has since revoked its official support, the industry lobbying group TechNet, whose members include Google, Facebook, Yahoo, and Microsoft, sent a letter to Congress earlier this month in support of the legislation: "This bill recognizes the need for effective cybersecurity legislation that encourages voluntary, bi-directional, real time sharing of actionable cyber threat information to protect networks." A few days later, the House passed that bill. The full list of pro-CISPA companies found here also includes IBM and HP.

Read more at The Atlantic Wire

Threatwatch Alert

Stolen credentials

Hackers Steal $31M from Russian Central Bank

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.