Reuters reports, in an article by Kevin Drawbaugh, dated April 8, 2011, that the U.S. House of Representatives voted to "reject Internet 'neutrality' rules that were adopted last year to keep big Internet service providers from blocking certain traffic." The vote, which largely followed party lines, had 240 votes for removal of the rules, […]
The International Business Times reports, in an article by Gabriel Perna dated March 29, 2011, that a recent audit by the Office of the Inspector General found that NASA's servers contain several vulnerabilities rendering the space agency open to a crippling cyber attack. Inspector General Paul K. Martin stated that "[w]e found that computer servers on […]
ag-IP-news Agency, a member of Talal Abu-Ghazaleh Organization, reports in an article dated February 20, 2011, that Business Softwar Alliance (BSA) has joined TechAmerica and the Information Technology Industry Council (ITI) "in urging Congress to support development and implementation of trusted identities online." According to ag-IP-news Agency, "the Business Software Alliance is the world's foremost […]
In an article by George V. Hulme, dated February 16, 2011, NetworkWorld reports that the "Department of Defense is set to soon complete a new cyber security strategy that will explicitly recognize cyberspace as a new and official warfare domain." The new strategy, "Cyber 3.0" will charge the military with "defending government networks just as […]
In an article by Susan Watts, of BBC Newsnight, published February 3, 2011, it appears that cyber security and specific rules of engagement in dealing with a cyber attack will, for the first time, be considered at this year's annual Munich Security Conference. "The world needs cyber war 'Rules of Engagement' to cope with […]