10:00 AM
Connect Directly

White House Will Soon Revive Cyber Security Legislation Push

A senior adviser to President Barack Obama said the White House will soon renew efforts to push cyber security legislation through Congress, though he foresaw an uphill battle given the failure of the last attempt.

A senior adviser to President Barack Obama said the White House will soon renew efforts to push cyber security legislation through Congress, though he foresaw an uphill battle given the failure of the last attempt.

Daniel said the White House has begun drafting "key legislative principles" for a new bill that it believes can pass both the House and Senate this time.

"We very much want a bill," White House cyber security coordinator Michael Daniel told Reuters while in San Francisco to meet industry experts and business leaders at a security conference. But he added: "I don't want to leave anybody with an impression that we underestimate the challenges."

"We will do our best to work with Congress," he added. "You will see that develop over the next couple of weeks to months," he said.

Cyber security legislation backed by the Obama administration died in the Senate in November amid fierce opposition from businesses that complained about over-regulation.

That bill would have increased information-sharing between intelligence agencies and private companies, with some privacy protections. It also would have set voluntary standards for businesses that control electric grids, water treatment plants and other essential facilities.

[See Related: Legislation Still Needed On National Cyber Security Standard]

In the absence of overarching legislation, the Obama administration will pursue other means to improve cyber security, he said. Those included implementing an executive order the president signed this month that seeks to better protect critical infrastructure from cyber-attacks.

The order directs federal authorities to improve information-sharing on cyber-threats - including some that may be classified - with companies that provide or support critical infrastructure.

"It would be a mistake to assume you can't make any progress in the absence of legislation," he said.

The principles that the White House will support in new legislation include requiring that a civilian agency must be in charge of information-sharing, Daniel said.

Last year's Senate plan likewise would have put the Department of Homeland Security squarely in charge, though it could turn to the military's National Security Agency for assistance.

Copyright 2013 by Reuters. All rights reserved.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Janice, I think I've got a message from the code father!
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.